Upcoming Events

ISE® PRIVATE DINNER
From the Inside Out: The Risk Departing Employees Present to Your Data

December 9, 2019
5:30pm - 8:30pm
Bourbon Steak
237 S Brand Blvd
Glendale, CA 91204
Registration
Jonathan Chow

Jonathan Chow
SVP, CISO
Live Nation Entertainment, Inc.

Last year, 40 million people changed jobs and 60% of them admitted to taking data when they left. This is deeply concerning when you also consider that 90% of insider threats go undetected for months. Many enterprises are unable to quickly detect the loss, leak and misuse of data from insider threats and departing employees. By the time organizations find out, the damage is already done. Part of the problem lies in the reliance on legacy data loss prevention solutions to catch data before it leaves an organization. These legacy solutions only look at classified data with policies, leaving security teams with limited visibility. Join our conversation as we discuss the security and business need for real time detection and response aimed at a growing insider threat: departing employees.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

December 10, 2019
5:30pm - 8:30pm
Gibson’s Bar & Steakhouse
5464 North River Road
Rosemont, IL 60018
Registration
Vallotti_Paolo

Paolo Vallotti
Global Chief Information Security Officer
Mondelez International

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

December 12, 2019
5:30pm - 8:30pm
American Prime
1420 Spring Hill Rd
McLean, VA 22102
Registration
Mike Gordon

Mike Gordon
CISO
Lockheed Martin

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.


2020 Upcoming Events

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 14, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 15, 2020
5:30pm - 8:30pm
Oak Steakhouse
4777 Sharon Rd #125
Charlotte, NC 28210
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
From Known to Zero-Day Threats: Leverage AI for Continuous Detection and Response

January 16, 2020
5:30pm - 8:30pm
Tulio
1100 Fifth Ave.
Seattle, WA 98121
Registration

The cybersecurity talent shortage along with overwhelming numbers of security alerts mean enterprise security teams have little time to hunt and analyze the threats that matter. While security teams naturally want to defend their organizations against the threats they know about, they sometimes lack the resources to do so. With zero-day vulnerabilities especially, security teams might not know they have them, and if they do, they cannot patch them before a cyber attacker successfully exploits them. By utilizing AI and 24/7 managed detection and response, security members can be taken out of the weeds and elevated to conduct transparent, proactive threat hunting in real time. Join our conversation as we discuss the challenges enterprise security teams face to locate and remediate vulnerabilities and how they can collaborate best with an MSSP’s platform that incorporates data science, threat research and human expertise to limit a breach’s impact.

ISE® PRIVATE DINNER
Farewell to Network Security as We Know It

January 21, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
4 Perimeter Park South
Birmingham, AL 35243
Registration

Netskope Executive Speaker:

Nate Smolenski

Nate Smolenski
Director of Enterprise Strategy
Netskope

Digital transformation as well as cloud-first and mobile-first security strategies are impacting every company across the globe, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can we manage the risk of what we cannot control or see? The problem exacerbates when we consider if we are granting users too much access to data we are not monitoring closely enough. Adopting a Zero Trust model could be the way to go, and top cloud security use cases are also driving the need for high-speed edge networks with security that follows the user, not the device. If you’re stuck using a legacy security stack, however, these options may not be easily enacted, but change is possible. Join our conversation as we discuss how to transform your network security strategy; integrate true Zero Trust; and address next-gen strategies using firewalls (NGFW), secure web gateways (SWGs), secure access (VPNs) and high-speed edge networks.

ISE® PRIVATE DINNER
Farewell to Network Security as We Know It

January 22, 2020
5:30pm - 8:30pm
The Capital Grille
1861 International Dr
McLean, VA 22102

Netskope Executive Speaker:

Nate Smolenski

Nate Smolenski
Director of Enterprise Strategy
Netskope

Digital transformation as well as cloud-first and mobile-first security strategies are impacting every company across the globe, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can we manage the risk of what we cannot control or see? The problem exacerbates when we consider if we are granting users too much access to data we are not monitoring closely enough. Adopting a Zero Trust model could be the way to go, and top cloud security use cases are also driving the need for high-speed edge networks with security that follows the user, not the device. If you’re stuck using a legacy security stack, however, these options may not be easily enacted, but change is possible. Join our conversation as we discuss how to transform your network security strategy; integrate true Zero Trust; and address next-gen strategies using firewalls (NGFW), secure web gateways (SWGs), secure access (VPNs) and high-speed edge networks.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 28, 2020
5:30pm - 8:30pm
Steak 48
4444 Westheimer Rd., Ste A100
Houston, TX 77027
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 29, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
114 W. 7th Street #110
Austin, TX 78701
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 30, 2020
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4023 Oak Lawn Ave
Dallas, TX 75219
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 12, 2020
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Registration

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® VIP Welcome Reception with Ionic Security During RSA® Conference 2020
Say Goodbye to Gridlock: The Shift of Modern Data Protection

Ionic


February 23, 2020
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
Register
More information

All too often, enterprise data security is siloed, but sensitive data is not. Data travels between and resides in applications, data stores, devices and different environments. Every point of access has a context, driven by identity, attributes and complex access policies, which can quickly overwhelm enterprises using disparate solutions and relying on siloes. What results is data security gridlock, which undermines the performance of your business and security team since they cannot scale data protection with the enterprise. For decades, security has focused on securing the gates, moats and fences around where data resides, but that is no longer an effective procedure. Now that location is no longer definitive, we need to go back to the basics and ask a simple question: Why don’t we just start with eliminating gridlock and protecting the data? Join our conversation as we discuss how to seamlessly enable scalable, sustainable and consistent data protection by securing sensitive data from unauthorized access and breaches, wherever it lives or travels.

ISE® VIP Private Dinner with Cisco During RSA® Conference 2020
Cleaning Out Your Security Closet

cisco


February 24, 2020
6:30 pm – 9:30 pm
Mastro’s Steakhouse
399 Geary St.
San Francisco, CA 94102
Register
More information

Security professionals go hand-in-hand with processes and technology. As security threats evolve and escalate, we tend to accumulate more and more tools and methods until our security stacks become cluttered and too complicated. If Marie Kondo were helping you tidy up, what would you remove from your security portfolio? We all have technologies and processes we cling to, not because we necessarily need them but because they are comfortable and familiar. If we take a step back and look at the bigger picture, we can determine the security solutions and processes we can live without while pinpointing what gaps we still need to fill. Join our conversation as we discuss a Marie Kondo approach to trimming down and cleaning up your security closet while also asking ourselves the inevitable question: does anything really spark joy in cybersecurity?

ISE® VIP Signature Luncheon with Cisco Umbrella During RSA® Conference 2020
Simplified Security Starts in the Cloud

cisco


February 25, 2020
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

The average company uses more than 75 security tools. Firewalls. Web proxies. SIEM. Appliances. Third-party intelligence. The list goes on… What do these tools have in common? They lead to silos and a sea of security alerts for overwhelmed staff who struggle to make sense of it all. With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users a growing target for attacks, it’s likely that your existing security stack is coming up short—and you’re not alone. There is a better way to secure cloud applications and internet access for on-the-go users. Join our conversation as we discuss the resulting security challenges and why many organizations are shifting security services to the cloud to reduce complexity, deliver greater flexibility and enact more consistent enforcement.

ISE® VIP Reception with LookingGlass During RSA® Conference 2020
Obtaining 20/20 Vision: Look Deeper and Act Faster With Smarter Intelligence-Driven Risk Management

LookingGlass


February 25, 2020
7:00 pm - 10:00 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
Register
More information

When your business is at risk, every second matters. The time your security teams spends researching and mitigating known threats is just as important as the time they lose at being unaware of hidden vulnerabilities. In order to obtain 20/20 vision of threats to your business, you will need to enlist an intelligence-driven risk management strategy that is seamless, comprehensive and fully integrated with your security and business needs. Keeping threats at bay on a global scale means meeting them on that scale with global attack surface monitoring, threat modeling, network defense and tailored intelligence-as-a-service. Each security partnership you forge should contribute actively to the defense of your enterprise network and beyond. The right threat intelligence partner will equip your security team with asset visibility and network traffic analysis along with the behavior and signature-based detection required to confidently protect your business. Join us to discuss the need for proactive global threat intelligence; the usefulness of advanced mitigation techniques such as deception and redirection; and how making the right security partnerships can enable us all to see more and act faster.

ISE® VIP Signature Luncheon with Respond Software During RSA® Conference 2020
It’s the End of the SOC as We Know It (And I Feel Fine)

Respond Software


February 26, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

Digital transformation is changing every part of the business, but when it comes to the security operations center (SOC), things haven’t changed much over the past ten years. Enterprises have many disparate security tools in place, and humans are sitting in the SOC, looking at mountains of data and trying to make a decision: Is this alert something to pay attention to, or is it just noise? The constant, overwhelming exposure to security alerts quickly adds up, in time, money and fatigue, leading to analyst burnout and high turnover with few conclusive security results to show for it. Whether your SOC is comprised of your own employees or handled by a service provider, you’ll want to ensure SOC members are happy, performing rewarding and impactful work, rather than getting lost in the trenches where machines and automation can flourish instead. To make a difference, you may have to get rid of filters, prioritize your people and reinvent your data management strategy in ways you never considered doing before. Join our conversation as we discuss how you can modernize your SOC, take advantage of new technology and change the way your SecOps team works.

ISE® VIP Reception with Digital Guardian During RSA® Conference 2020
Make the Leap to Cloud-Delivered Data Protection (DLP + EDR)

Digital Guardian


February 26, 2020
6:30 pm - 9:30 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
Register
More information

Thanks to the emphasis on data privacy, we are witnessing a resurgence of Data Loss Prevention (DLP) within organizations. A Gartner study predicts that 85% of organizations will have implemented DLP by 2020, up from 50% in 2017. However, traditional DLP solutions are often limited to guarding against insider threats, forcing enterprises to enlist additional tools to defend against the variety of threats challenging security teams. As a result, security stacks become more complicated, signaling that it’s time to make the leap and allow your DLP strategy to advance with the rest of your security. Since cloud-based security continues to increase in demand, DLP also needs to be cloud-delivered and bolstered by Endpoint Detection and Response (EDR). Cyber attackers are smart; we need to be smarter. Join our conversation as we discuss how you and your security team can reinvent DLP with the cloud and EDR, simplify your security program and mitigate risks to your sensitive data.

ISE® VIP Signature Luncheon with Secureworks During RSA® Conference 2020
Enabling Modern Security Operations to Scale Using the Power of Data Science and the Cloud

secureworks


February 27, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

Modern security operations require a more agile, scalable, and effective model to address the challenges CISOs face with cloud and software-defined IT landscapes and escalating threats. This evolved approach demands a leap forward in capabilities powered by the speed and scale of machine learning, deep learning, and cloud computing. Join our conversation as we discuss how to put the power of data science and the cloud to work by analyzing vendor-inclusive data from the extended IT ecosystem. The insights gained will enable greater visibility, more reliable decision-making, and smarter automation.