Upcoming Events

Secureworks Access18 Conference
Panel: Building a Successful Security Team

October 22, 2018
3:45pm - 4:45pm
Loews Hotel
1065 Peachtree St NE
Atlanta, GA 30309
More Information
Registration

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Linda Marcone

Linda Marcone
CISO
Serta Simmons Bedding
Biography

Terry McGraw

Terry McGraw
Vice President, Global Cyber Threat Research and Analysis
Secureworks
Biography

Kathy Memenza

Kathy Memenza
CISO
Hilton

Loren Morgan

Loren Morgan
CISO
Owens & Minor
Biography

Kevin Morrison

Kevin Morrison
Vice President of IT & CISO
Rollins
Biography

As the threat landscape continuously evolves and security solutions multiply, CISOs face serious challenges in obtaining, growing, and retaining a security team that can keep pace with the organization’s needs. The skills gap especially is a universal issue across organizations of all sizes, so much so that IDC reports that 30 percent of security spending will be on vendors that provide an integrated platform approach to security, including the use of Managed Security Service Providers (MSSPs), by 2020. CISOs can prepare for this shift by thoroughly evaluating an MSSP to ensure it meets their organization’s security requirements. Once CISOs have found the right MSSP, they can integrate it with their current security strategy so it adds value, rather than complexity, to their processes. As for internal security team members, CISOs have a responsibility to utilize and nurture their skills to their fullest potential. If CISOs can provide training initiatives that are relevant to the team’s unique challenges and utilize an MSSP to tackle responsibilities their team doesn’t have time for, they can ultimately improve employee retention and scalability. By utilizing a shared responsibility model that focuses on people, processes, technology, and strategy, CISOs can build security teams so that they are stronger and more prepared for the future than ever before.

ISE® PRIVATE DINNER
Security 2025: What Does the Future of Security Look Like?

October 23, 2018
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Registration

Netskope Executive Speakers:

Sean Cordero
VP of Cloud Strategy
Netskope

Vladimir Klasnja
Director, Cloud Architecture Services
Netskope

ISE® Guest Host:

Dave Estlick

Dave Estlick
CISO
Starbucks Coffee Company

For the last 20 years we have reactively implemented monolithic security solutions by stacking legacy products on top of each other. This non-integrated approach has forced our organizations to confront significant complexity, resource drag and lack of effectiveness. As a community, it’s time to unite and define the new North Star of where security is headed. How do we challenge ourselves to a new way of thinking? What do we want our organizations to look like? How do we shift ourselves into a position where we can capably manage fast-paced challenges? Security 2025 is a research project focused on building a new and sustainable security blueprint. By coming together as security leaders, we can use our real-world experiences and knowledge to redesign and rebuild the engine of security. Join us for an evening of conversation as we discuss our unified approach in creating a cohesive and effective operating model that the industry can utilize for years to come.

ISE® PRIVATE DINNER
Protecting IT Ecosystems Within an All Encrypted Internet

October 25, 2018
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Registration
Randy Conner

Randy Conner
Director, Threat Prevention, Detection and Response
NCR Corporation

“HTTPS Everywhere” is changing the way that companies and users engage with websites. HTTPS connections use SSL/TLS technology primarily to secure data and to authenticate servers, which protects communications. An internet that achieves 100-percent encryption is a positive step, but what are the repercussions of having this type of security in an IT ecosystem? Join our conversation as we discuss the pros and cons of having an all-encrypted internet and the fundamental shifts to the way IT professionals and customers will maintain security.

ISE® PRIVATE DINNER
Security Perspectives – Technology

October 30, 2018
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Registration
Kornberg_Avram

Avram Kornberg
Security and Technology Executive & Founder
Stratecution Consulting, LLC.
Biography

Many modern enterprises are encumbered with an IT architecture that has evolved organically over time. The realities of competing priorities, limited staffing, and budget constraints often mean that systems and strategies remain in place for far longer than originally intended. This can result in a significant burden of cost and complexity and can compromise a business’s agility. Further complicating the issue is the fact that many security teams are constantly being asked to do more with less. When it comes time to choose between rolling out new business services and updating legacy technology, new services almost always win out. But the long-term impacts of these decisions add up over time. Maintenance creates a tax on IT and security. Join our conversation as we discuss how your security team can approach creating a more modern security architecture while dealing with the challenges of legacy technology.

ISE® NORTH AMERICA PRIVATE WELCOME DINNER
Improving Visibility for Effective Threat Detection and Response

November 7, 2018
5:30pm - 8:30pm
Chicago Cut
300 N LaSalle Dr
Chicago, IL 60654
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® North America Leadership Summit and Awards 2018

The ISE® North America Leadership Summit and Awards 2018 will be held November 8-9, 2018 at Summit Centre and Hyatt Regency Chicago, in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

November 13, 2018
5:30pm - 8:30pm
555 East American Steakhouse
555 East Ocean Boulevard
Long Beach, CA 90802
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

November 13, 2018
5:30pm - 8:30pm
The Capital Grille
Tyson’s Corner Center
1861 International Dr.
McLean, VA 22102
Registration

Secureworks Executive Speakers:

Kathy Fithen

Kathy Fithen
Managing Principal Consultant
Secureworks
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Security Perspectives – Technology

November 14, 2018
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson St.
San Francisco, CA 94111
Registration
Kornberg_Avram

Avram Kornberg
Security and Technology Executive & Founder
Stratecution Consulting, LLC.
Biography

Many modern enterprises are encumbered with an IT architecture that has evolved organically over time. The realities of competing priorities, limited staffing, and budget constraints often mean that systems and strategies remain in place for far longer than originally intended. This can result in a significant burden of cost and complexity and can compromise a business’s agility. Further complicating the issue is the fact that many security teams are constantly being asked to do more with less. When it comes time to choose between rolling out new business services and updating legacy technology, new services almost always win out. But the long-term impacts of these decisions add up over time. Maintenance creates a tax on IT and security. Join our conversation as we discuss how your security team can approach creating a more modern security architecture while dealing with the challenges of legacy technology.

ISE® PRIVATE DINNER
Security 2025: What Does the Future of Security Look Like?

November 27, 2018
5:30pm - 8:30pm
The Capital Grille- Dunwoody
94 Perimeter Center West
Dunwoody, GA 30346
Registration

Netskope Executive Speakers:

James Robinson

James Robinson
Deputy CISO
Netskope

Nate Smolenski

Nate Smolenski
Director, Enterprise Strategy
Netskope

ISE® VIP Host:

Stacy Hughes

Stacy Hughes
SVP, IT Governance, Risk and Compliance
Global Payments

For the last 20 years we have reactively implemented monolithic security solutions by stacking legacy products on top of each other. This non-integrated approach has forced our organizations to confront significant complexity, resource drag and lack of effectiveness. As a community, it’s time to unite and define the new North Star of where security is headed. How do we challenge ourselves to a new way of thinking? What do we want our organizations to look like? How do we shift ourselves into a position where we can capably manage fast-paced challenges? Security 2025 is a research project focused on building a new and sustainable security blueprint. By coming together as security leaders, we can use our real-world experiences and knowledge to redesign and rebuild the engine of security. Join us for an evening of conversation as we discuss our unified approach in creating a cohesive and effective operating model that the industry can utilize for years to come.

ISE® PRIVATE DINNER
Maximizing Your Existing Security Investments

November 29, 2018
5:30pm - 8:30pm
Morton’s The Steakhouse
2222 McKinney Ave.
Dallas, TX 75201
Registration

Even with all the security tools and software currently available, cyberattacks are still succeeding against enterprises despite their dramatically improved defenses. Unfortunately, there is no one tool that can guarantee 100% protection, which means enterprises must layer their defenses using the tools and teams they currently have available. Despite this necessity, however, many organizations struggle to harness their investments to their full potential, citing either a lack of knowledge on how to properly configure software or a lack of personnel who can capably utilize investments to meet business objectives. To change this narrative, security executives will need to look past alerts and begin to measure security investments by the value they bring to both team and business. Join our conversation as we discuss lessons learned on optimizing your existing tools, understanding the evolving attack surface, and making the most of your existing team by tracking metrics that matter.