Upcoming Events

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 28, 2020
5:30pm - 8:30pm
Steak 48
4444 Westheimer Rd., Ste A100
Houston, TX 77027
Registration closed. If you are interested in attending, please contact: Anna Stutler

Martin Littmann
CTO & CISO
Kelsey-Seybold Clinic
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 29, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
114 W. 7th Street #110
Austin, TX 78701
Registration

Sameer Sait
CISO, Whole Foods Market
Amazon
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 30, 2020
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4023 Oak Lawn Ave
Dallas, TX 75219
Registration
Shamoun Siddiqui

Shamoun Siddiqui
VP, CISO
Neiman Marcus
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Stop Buying Security Products: Fix Your Security Posture Using What You Have

February 5, 2020
5:30pm - 8:30pm
Del Frisco's Double Eagle Steakhouse
236 Perimeter Center Pkwy NE
Suite 120
Dunwoody, GA 30346
Registration
Tony Spurlin

Tony Spurlin
Vice President & Chief Security Officer
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

Is your organization protected against every known attack, including the vulnerabilities announced yesterday? Zero-day attacks garner plenty of attention, but the truth is 99% of all cyberattacks occur due to hackers exploiting existing or known vulnerabilities. You likely already have cybersecurity products that could protect you, but chances are they have not been configured correctly to your enterprise’s specific risk profile. For instance, Gartner estimates that 95% of firewall breaches are caused by simple firewall misconfigurations, yet 97% of breaches are still happening to companies that have already deployed the right controls. Breaches are arising more often because complexity is your enemy. If your security team is managing too many solutions—some of which might not be optimal for your current enterprise security requirements—then a simple misconfiguration or drift is all an attacker needs to exploit within your security stack to gain entrance. You do not need another security product. You just need to use what you have, better. Join our conversation as we discuss how to continually and safely test every part of your security infrastructure for gaps as well as how to prioritize remediation based on business risk.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 6, 2020
5:30pm - 8:30pm
Smith & Wollensky
1 Washington Ave.
Miami Beach, FL 33139
Registration

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 11, 2020
5:30pm - 8:30pm
Waterbar
399 The Embarcadero
San Francisco, CA 94105
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 12, 2020
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Registration
murphy_sean

Sean Murphy
SVP, CISO
BECU

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 18, 2020
5:30pm - 8:30pm
Morton’s The Steakhouse
227 W Trade St., Suite 150
Charlotte, NC 28202
Registration
Tim Morris

Tim Morris
Information Security Area Manager, SVP, Cyber Threat Engineering & Research
Wells Fargo & Company
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 19, 2020
5:30pm - 8:30pm
The Capital Grille
1861 International Dr.
McLean, VA 22102
Registration

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
From Candidate to Expert: Cyber Range Training Across the Entire Employee Lifecycle

February 20, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration

Cyber threats are ever-increasing and aggressive, causing no shortage of trouble for overworked and understaffed security teams. According to Gartner’s 2019 CIO Agenda, 95% of CIOs expect cybersecurity threats to get worse. Enterprises are looking for innovative candidates to join as security professionals, but hiring and training employees can be a challenge in and of itself. Enter cyber ranges, controlled virtual environments where white hats can train extensively to repel the worst efforts of cyber attackers and hone their skills. Enterprises, non-profits, universities and global governments can buy a cyber range, buy time on a cyber range—or even build their own or use less immersive gamification platforms to train. Practice makes perfect, and by using a cyber range, security candidates can become experts without any organization needing to exposure their infrastructure. Join our conversation as we discuss how to use cyber ranges throughout the entire lifecycle of a security professional—from screening and assessing candidates to onboarding and retention—as well as how they improve SOC productivity and preparedness for real-world attacks.

ISE® VIP Welcome Reception with Ionic Security During RSA® Conference 2020
Say Goodbye to Gridlock: The Shift of Modern Data Protection

Ionic


February 23, 2020
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
Register
More information

All too often, enterprise data security is siloed, but sensitive data is not. Data travels between and resides in applications, data stores, devices and different environments. Every point of access has a context, driven by identity, attributes and complex access policies, which can quickly overwhelm enterprises using disparate solutions and relying on siloes. What results is data security gridlock, which undermines the performance of your business and security team since they cannot scale data protection with the enterprise. For decades, security has focused on securing the gates, moats and fences around where data resides, but that is no longer an effective procedure. Now that location is no longer definitive, we need to go back to the basics and ask a simple question: Why don’t we just start with eliminating gridlock and protecting the data? Join our conversation as we discuss how to seamlessly enable scalable, sustainable and consistent data protection by securing sensitive data from unauthorized access and breaches, wherever it lives or travels.

ISE® VIP Private Dinner with Cisco During RSA® Conference 2020
Cleaning Out Your Security Closet

cisco


February 24, 2020
6:30 pm – 9:30 pm
Mastro’s Steakhouse
399 Geary St.
San Francisco, CA 94102
Register
More information

Security professionals go hand-in-hand with processes and technology. As security threats evolve and escalate, we tend to accumulate more and more tools and methods until our security stacks become cluttered and too complicated. If Marie Kondo were helping you tidy up, what would you remove from your security portfolio? We all have technologies and processes we cling to, not because we necessarily need them but because they are comfortable and familiar. If we take a step back and look at the bigger picture, we can determine the security solutions and processes we can live without while pinpointing what gaps we still need to fill. Join our conversation as we discuss a Marie Kondo approach to trimming down and cleaning up your security closet while also asking ourselves the inevitable question: does anything really spark joy in cybersecurity?

ISE® VIP Signature Luncheon with Cisco Umbrella During RSA® Conference 2020
Simplified Security Starts in the Cloud

cisco


February 25, 2020
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

The average company uses more than 75 security tools. Firewalls. Web proxies. SIEM. Appliances. Third-party intelligence. The list goes on… What do these tools have in common? They lead to silos and a sea of security alerts for overwhelmed staff who struggle to make sense of it all. With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users a growing target for attacks, it’s likely that your existing security stack is coming up short—and you’re not alone. There is a better way to secure cloud applications and internet access for on-the-go users. Join our conversation as we discuss the resulting security challenges and why many organizations are shifting security services to the cloud to reduce complexity, deliver greater flexibility and enact more consistent enforcement.

ISE® VIP Reception with LookingGlass During RSA® Conference 2020
Obtaining 20/20 Vision: Look Deeper and Act Faster With Smarter Intelligence-Driven Risk Management

LookingGlass


February 25, 2020
7:00 pm - 10:00 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
Register
More information

When your business is at risk, every second matters. The time your security teams spends researching and mitigating known threats is just as important as the time they lose at being unaware of hidden vulnerabilities. In order to obtain 20/20 vision of threats to your business, you will need to enlist an intelligence-driven risk management strategy that is seamless, comprehensive and fully integrated with your security and business needs. Keeping threats at bay on a global scale means meeting them on that scale with global attack surface monitoring, threat modeling, network defense and tailored intelligence-as-a-service. Each security partnership you forge should contribute actively to the defense of your enterprise network and beyond. The right threat intelligence partner will equip your security team with asset visibility and network traffic analysis along with the behavior and signature-based detection required to confidently protect your business. Join us to discuss the need for proactive global threat intelligence; the usefulness of advanced mitigation techniques such as deception and redirection; and how making the right security partnerships can enable us all to see more and act faster.

ISE® VIP Signature Luncheon with Respond Software During RSA® Conference 2020
It’s the End of the SOC as We Know It (And I Feel Fine)

Respond Software


February 26, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

Digital transformation is changing every part of the business, but when it comes to the security operations center (SOC), things haven’t changed much over the past ten years. Enterprises have many disparate security tools in place, and humans are sitting in the SOC, looking at mountains of data and trying to make a decision: Is this alert something to pay attention to, or is it just noise? The constant, overwhelming exposure to security alerts quickly adds up, in time, money and fatigue, leading to analyst burnout and high turnover with few conclusive security results to show for it. Whether your SOC is comprised of your own employees or handled by a service provider, you’ll want to ensure SOC members are happy, performing rewarding and impactful work, rather than getting lost in the trenches where machines and automation can flourish instead. To make a difference, you may have to get rid of filters, prioritize your people and reinvent your data management strategy in ways you never considered doing before. Join our conversation as we discuss how you can modernize your SOC, take advantage of new technology and change the way your SecOps team works.

ISE® VIP Reception with Digital Guardian During RSA® Conference 2020
Make the Leap to Cloud-Delivered Data Protection (DLP + EDR)

Digital Guardian


February 26, 2020
6:30 pm - 9:30 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
Register
More information

Thanks to the emphasis on data privacy, we are witnessing a resurgence of Data Loss Prevention (DLP) within organizations. A Gartner study predicts that 85% of organizations will have implemented DLP by 2020, up from 50% in 2017. However, traditional DLP solutions are often limited to guarding against insider threats, forcing enterprises to enlist additional tools to defend against the variety of threats challenging security teams. As a result, security stacks become more complicated, signaling that it’s time to make the leap and allow your DLP strategy to advance with the rest of your security. Since cloud-based security continues to increase in demand, DLP also needs to be cloud-delivered and bolstered by Endpoint Detection and Response (EDR). Cyber attackers are smart; we need to be smarter. Join our conversation as we discuss how you and your security team can reinvent DLP with the cloud and EDR, simplify your security program and mitigate risks to your sensitive data.

ISE® VIP Signature Luncheon with Secureworks During RSA® Conference 2020
Enabling Modern Security Operations to Scale Using the Power of Data Science and the Cloud

secureworks


February 27, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

Modern security operations require a more agile, scalable, and effective model to address the challenges CISOs face with cloud and software-defined IT landscapes and escalating threats. This evolved approach demands a leap forward in capabilities powered by the speed and scale of machine learning, deep learning, and cloud computing. Join our conversation as we discuss how to put the power of data science and the cloud to work by analyzing vendor-inclusive data from the extended IT ecosystem. The insights gained will enable greater visibility, more reliable decision-making, and smarter automation.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 4, 2020
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4400 W Boy Scout Blvd
Tampa, FL 33607
Registration
Myrna Soto

Myrna Soto
COO, Digital Hands
Current Active Board Member, CMS Energy, Spirit Airlines and Popular Inc.
ISE® Northeast Executive Award Winner 2013
ISE® North America Commercial Executive Award Finalist 2013
ISE® North America Commercial Executive Award Finalist 2012
ISE® Northeast Executive Award Finalist 2012

Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 5, 2020
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

ISE® SOUTHEAST PRIVATE WELCOME DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

March 10, 2020
5:30pm - 8:30pm
STK Steakhouse
1075 Peachtree St NE
Atlanta, GA 30309
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® Southeast Executive Forum and Awards 2020

The ISE® Southeast Executive Forum and Awards 2020 will be held March 11, 2020 at the Westin Peachtree Plaza Downtown in Atlanta, GA.

New! Our ISE® Southeast Awards Gala will be in a new Ballroom of the Westin Peachtree Plaza starting in 2020 so the entire event is in the same building!

The ISE® Southeast Awards was held in conjunction with a one day Executive Forum which included keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offered the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 18, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 19, 2020
5:30pm - 8:30pm
Davio’s
111 South 17th Street
Philadelphia, PA 19103
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 25, 2020
5:30pm - 8:30pm
Mastro’s Steakhouse
1650 W Loop S.
Houston, TX 77027
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

April 9, 2020
5:30pm - 7:00pm
Goodwill Career Center
3250 S. Cobb Drive
Smyrna, GA 30080
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

ISSA-LA Summit XII
Keeping the Momentum Going: The Growth of Women, Minorities and Youth in Cybersecurity

May 7, 2020
10:20am - 11:10am
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
Registration
More Information

Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

As one of the fastest-growing industries worldwide, cybersecurity is in sore need of new talent to fill its millions of open positions. Women, minorities and young people comprise a significant portion of America’s workforce, and they are increasingly becoming intrigued with starting a career in cybersecurity. Studies performed by (ISC)² show that minority representation within cybersecurity is 26%, with 62% holding a master’s degree or higher; meanwhile, female representation has risen to 24%, with 45% of those women being millennials and 52% holding post-graduate degrees. These are clear signs of progress from where the industry first started, but we need to continue propelling this momentum forward. Join Marci McCarthy as she discusses how leadership, mentorship and technology are crucial in retaining and nurturing women and minorities as well as how we can think outside the box to uncover unconventional talent in unconventional places.

ISSA-LA Summit XII
All Roads Lead to Cybersecurity: Diverse Roles for a Diverse Workforce

May 8, 2020
11:00am - 11:50am
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
Registration
More Information

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Panelists to be announced very soon!

Cybersecurity is a rewarding industry, but it can be difficult for women and minorities to enter and is full of problems to solve once you get there. However, it’s those same challenges that excite and motivate newcomers to sign up for a career in cybersecurity. So many roles in the field offer fulfilling purpose as well as valuable professional and personal growth—and they are not constrained to one set path. The cybersecurity road is full of forks, and professionals involve themselves in various ways, some in technical roles, others in marketing, communications, entrepreneurship and more. This level of flexibility and diversity in the field warrants candidates who are just as flexible, diverse and talented, but it is the responsibility of current professionals to demonstrate how this is a recipe for success. Join our conversation as our panel of security professionals share how they come together through many different roles to make cybersecurity work. They will also impart their personal success stories and insights about how women and minorities can stand out and step up as promising new talent in the field.

ISE® Central Executive Forum and Awards 2020

The ISE® Central Executive Forum and Awards 2020 will be held May 14, 2020 at The Westin Dallas Downtown in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details