Upcoming Events

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

August 27, 2019
5:30pm - 8:30pm
Little Alley Steak – Buckhead
3500 Lenox Rd NE Suite 100
Atlanta, GA 30326
Registration
Kevin Morrison

Kevin Morrison
Chief Information Security Officer
Pulte Group, Inc.
ISE® Southeast People’s Choice Award Winner 2015
Biography

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

September 10, 2019
5:30pm - 8:30pm
Ocean Prime
124 S 15th St.
Philadelphia, PA 19102
Registration

Dave Snyder
Chief Information Security Officer
Independence Blue Cross
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
The Rise of Global Identity in Digital Transactions

September 11, 2019
5:30pm - 8:30pm
Seven Steakhouse
700 Hennepin Ave
Minneapolis, MN 55403
Registration

William Scandrett
VP, CISO
Allina Health
Biography

With cloud usage growing and the concern for data security on the rise, regulatory entities around the globe are increasingly introducing and enforcing new legislation that brings greater transparency between the user and end-entity in digital transactions. We have witnessed the stir GDPR has and will continue to cause, especially as more enterprises seek to redefine their compliance to its standards. Then, there is eIDAS, which aims to create a robust European legal environment for secure and trustworthy electronic business processes in the public sector. Meanwhile, PSD2 introduces new business models between banks and third-party service providers, while Germany’s BSI promotes IT security for its federal government as well as for IT manufacturers and commercial providers. While the European Union is leading the charge toward the rise of identity in many instances, this has direct impact on multi-national businesses based in North America. In the United States there are already regulations in place—some industry specific such as PCI DSS and HIPPA Privacy Rules—that organizations must comply with. What are the responsibilities North American enterprises are expected to uphold of these many regulations, and what are the ramifications of non-compliance? As security and identity take on a more global aspect, it has also become crucial to provide clear indicators—such as verified SSL certificates and universal identity marks in web browsers—to specify trusted communication with verified organizations. Having these indicators be uniform and easy to interpret can reduce or eliminate the chances of transmitting sensitive data through a secure channel to a bad actor, which also makes it simpler to follow compliance regulations, no matter their origin. Join our conversation as we discuss how overseas regulations for digital transactions impact businesses in the United States and across North America, what this means for security identity management, and how we can capitalize on these regulations to build more trusted relationships with users and customers.

ISE® PRIVATE DINNER EVENING PRIOR TO INFOSEC NASHVILLE
Security Maturity: Mapping the Road to Resilience

September 12, 2019
5:30pm - 8:30pm
Cocktail Hour
Cumberland Bar
JW Marriott Nashville
201 8th Ave S
Nashville, TN 37203

Dinner
Bourbon Steak
JW Marriott Nashville
201 8th Ave S, 34th floor
Nashville, TN 37203
Registration
Maxwell_Dirk

Dirk Maxwell
Chief Information Security Officer
LKQ Corporation
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
The Rise of Global Identity in Digital Transactions

September 19, 2019
5:30pm - 8:30pm
George
111C Queen St. E
Toronto, ON M5C 1S2
Registration
Weston_Stephen

Stephen Weston
Vice President, Chief Information Security Officer
Canadian Tire Corporation
Biography

With cloud usage growing and the concern for data security on the rise, regulatory entities around the globe are increasingly introducing and enforcing new legislation that brings greater transparency between the user and end-entity in digital transactions. We have witnessed the stir GDPR has and will continue to cause, especially as more enterprises seek to redefine their compliance to its standards. Then, there is eIDAS, which aims to create a robust European legal environment for secure and trustworthy electronic business processes in the public sector. Meanwhile, PSD2 introduces new business models between banks and third-party service providers, while Germany’s BSI promotes IT security for its federal government as well as for IT manufacturers and commercial providers. While the European Union is leading the charge toward the rise of identity in many instances, this has direct impact on multi-national businesses based in North America. In the United States there are already regulations in place—some industry specific such as PCI DSS and HIPPA Privacy Rules—that organizations must comply with. What are the responsibilities North American enterprises are expected to uphold of these many regulations, and what are the ramifications of non-compliance? As security and identity take on a more global aspect, it has also become crucial to provide clear indicators—such as verified SSL certificates and universal identity marks in web browsers—to specify trusted communication with verified organizations. Having these indicators be uniform and easy to interpret can reduce or eliminate the chances of transmitting sensitive data through a secure channel to a bad actor, which also makes it simpler to follow compliance regulations, no matter their origin. Join our conversation as we discuss how overseas regulations for digital transactions impact businesses in the United States and across North America, what this means for security identity management, and how we can capitalize on these regulations to build more trusted relationships with users and customers.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

September 21, 2019
1:30pm - 3:00pm
On the Rise Financial Center
810 Joseph E. Boone Blvd.
Atlanta, GA 30314
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

Cybercon 2019
Cybersecurity: Identifying and Managing Risk From All Angles

September 24, 2019
Loudermilk Conference Center
40 Courtland St NE
Atlanta, GA 30303
More Information
Registration

(Chrome, Firefox or Edge Required)

Cybercon's 5th year brings together best-in-class experts to discuss identifying and managing cyber risk during an unprecedented era of technological transformation. AI, Blockchain and Autonomous Vehicles are just three examples of technologies that are transforming business operations. Evolving business operations also means new cyber threats must be identified and managed. At the same time, the private sector and government are grappling with creating a better regulatory landscape for cybersecurity and privacy to keep up with a 21st century digital economy.

Workshops are offered during the full day conference specifically aimed at business operations and focusing on managing and growing your business with cybersecurity concerns in mind. We believe learning is best done by participating in workshops that emphasize interactive content. Cybercon will have breach simulations where you engage in crisis management with incomplete facts under time pressure.

Cybercon is designed for General Counsels, Chief Financial Officers, business owners, cybersecurity experts, Chief Information Officers and Chief Information Security Officers to collaborate on the current cybersecurity challenges businesses face in this fast-paced environment. This year’s goal is to identify practical mitigation strategies that will have measurable impact on a business' risk profile and bottom line.

The ISE® Lions' Den & Jungle Lounge



September 25, 2019
Atlanta Tech Village | Atlanta, GA
Details
Registration

This September, TEN of security’s hottest emerging security companies have the courage to enter… The 2019 ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for the next great emerging technology solutions. Each Gazelle will deliver their best pitch for the chance to earn $25,000 worth of prizes. Additionally, the Jungle Lounge will offer the opportunity to learn more about these emerging companies and a chance to network with a diverse group of Imformation Security Executives, investors, and other key members of the InfoSec community.

ISE® NORTHEAST PRIVATE WELCOME DINNER
Which of the Status Quos in Security Needs to Be Broken?

October 2, 2019
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration

Cybersecurity did not always have a status quo. IT professionals merely created best practices and shared them with the best of intentions. Because these practices and procedures worked at the time, we’ve been clinging to them ever since, even though they often create operational roadblocks and headaches and don’t always keep businesses safe. Why are common procedures and old beliefs about security lingering even though they are clearly outdated or outright wrong to continue? Join our conversation as we discuss security practices involving business, organization, operations, technology, and marketing, answering the questions of why certain activities persist despite being past their due date and how we can overcome the status quo.

ISE® Northeast Executive Forum and Awards 2019

The ISE® Northeast Executive Forum and Awards 2019 will be held October 3, 2019 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISSA Metro Atlanta: Women in Security

October 8, 2019
One Alliance Center/SAP America
3500 Lenox Rd
GT12
Atlanta, GA 30326
More Information
Registration

Opening Presentation by the Georgia Secretary of State’s Office

3:00pm - 3:45pm

Speakers

Brad Raffensperger
Secretary of State
Georgia Secretary of State’s Office
Biography

Jordan Fuchs
Deputy Secretary of State
Georgia Secretary of State’s Office
Biography

Georgia Secretary of State Brad Raffensperger and Deputy Secretary of State Jordan Fuchs will open our event with an inspiring, informative presentation to kick off the afternoon.

Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

3:50pm - 4:20pm

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

Paying It Forward: Cultivating a New Cybersecurity Workforce

4:25pm - 5:30pm

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Stacy Hughes

Stacy Hughes
SVP, IT Governance, Risk and Compliance
Global Payments
Biography

Marian Reed

Marian Reed
Sr. Director, Global ISOC
McKesson
Biography

Julie Talbot-Hubbard

Julie Talbot-Hubbard
General Manager, Global Vice President of Digital Identity and Data Services
Optiv
ISE® Central Executive Award Winner 2010
Biography
T.E.N. Success Story

Welfare_Sandy

Sandy Welfare
Senior Manager, Program Operations IT ePMO
WestRock
Biography

Women and minorities constitute half of technology users, making it only natural for current cybersecurity professionals to look to them as the next generation to carry the torch. Not only is it important to have a cybersecurity workforce that reflects the diversity of its tech users, but also it is a necessity to pursue at a time when both the growth and the talent shortage of the industry are at an all-time high. In order to obtain and mentor this next generation of skilled, ambitious young people, we must put in the work and pass on what we have learned to them. Join our conversation as our panel of leading security executives discuss how to develop and cultivate this next generation workforce and how to locate and inspire them. They will also share their personal success stories and insights on how to make new connections as well as tips for expanding your professional network.

ISE® PRIVATE DINNER
Digitization and the Path to Business Transformation Via Total Data Intelligence

October 10, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post Road
San Francisco, CA 94102
Registration

Because of digitization, the amount of data existing in the world has exploded, with 2.5 quintillion bytes created every day according to Forbes. With new data regulations emerging globally as a result, data privacy and cybersecurity have become top concerns for the Chief Data Officer and CISO alike. Many security professionals report that they do not currently have access to company data necessary to perform their jobs, leaving us to answer a pivotal question: How can we drive pervasive data intelligence in the organization, while reducing risks and protecting customer data privacy? Digitization only complicates this question with security leaders considering how the large movement of data will change the needs of their security program and impact strategies for protecting the data an organization collects. The majority of IT decision-makers agree they want pervasive data intelligence in their organization, but there are bottlenecks on the path to achieving 100% real-time intelligent answers, such as compliance standards, regulation requirements and risk concerns to both business and security. Join our conversation as we discuss how digitization has affected the path to business transformation and data security, requiring new approaches to acquire pervasive data intelligence that is scalable, frictionless and omnipresent.

ISE® PRIVATE DINNER
The Rise of Global Identity in Digital Transactions

October 10, 2019
5:30pm - 8:30pm
Gibsons Bar & Steakhouse
5464 North River Road
Rosemont, IL 60018
Registration

With cloud usage growing and the concern for data security on the rise, regulatory entities around the globe are increasingly introducing and enforcing new legislation that brings greater transparency between the user and end-entity in digital transactions. We have witnessed the stir GDPR has and will continue to cause, especially as more enterprises seek to redefine their compliance to its standards. Then, there is eIDAS, which aims to create a robust European legal environment for secure and trustworthy electronic business processes in the public sector. Meanwhile, PSD2 introduces new business models between banks and third-party service providers, while Germany’s BSI promotes IT security for its federal government as well as for IT manufacturers and commercial providers. While the European Union is leading the charge toward the rise of identity in many instances, this has direct impact on multi-national businesses based in North America. In the United States there are already regulations in place—some industry specific such as PCI DSS and HIPPA Privacy Rules—that organizations must comply with. What are the responsibilities North American enterprises are expected to uphold of these many regulations, and what are the ramifications of non-compliance? As security and identity take on a more global aspect, it has also become crucial to provide clear indicators—such as verified SSL certificates and universal identity marks in web browsers—to specify trusted communication with verified organizations. Having these indicators be uniform and easy to interpret can reduce or eliminate the chances of transmitting sensitive data through a secure channel to a bad actor, which also makes it simpler to follow compliance regulations, no matter their origin. Join our conversation as we discuss how overseas regulations for digital transactions impact businesses in the United States and across North America, what this means for security identity management, and how we can capitalize on these regulations to build more trusted relationships with users and customers.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

October 23, 2019
5:30pm - 8:30pm
Elway’s Cherry Creek
2500 E 1st Ave, #101
Denver, CO 80206
Registration

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
The Rise of Global Identity in Digital Transactions

October 24, 2019
5:30pm - 8:30pm
Perry’s Steakhouse & Grille
2000 McKinney Ave #100
Dallas, TX 75201
Registration

With cloud usage growing and the concern for data security on the rise, regulatory entities around the globe are increasingly introducing and enforcing new legislation that brings greater transparency between the user and end-entity in digital transactions. We have witnessed the stir GDPR has and will continue to cause, especially as more enterprises seek to redefine their compliance to its standards. Then, there is eIDAS, which aims to create a robust European legal environment for secure and trustworthy electronic business processes in the public sector. Meanwhile, PSD2 introduces new business models between banks and third-party service providers, while Germany’s BSI promotes IT security for its federal government as well as for IT manufacturers and commercial providers. While the European Union is leading the charge toward the rise of identity in many instances, this has direct impact on multi-national businesses based in North America. In the United States there are already regulations in place—some industry specific such as PCI DSS and HIPPA Privacy Rules—that organizations must comply with. What are the responsibilities North American enterprises are expected to uphold of these many regulations, and what are the ramifications of non-compliance? As security and identity take on a more global aspect, it has also become crucial to provide clear indicators—such as verified SSL certificates and universal identity marks in web browsers—to specify trusted communication with verified organizations. Having these indicators be uniform and easy to interpret can reduce or eliminate the chances of transmitting sensitive data through a secure channel to a bad actor, which also makes it simpler to follow compliance regulations, no matter their origin. Join our conversation as we discuss how overseas regulations for digital transactions impact businesses in the United States and across North America, what this means for security identity management, and how we can capitalize on these regulations to build more trusted relationships with users and customers.

2019 GAISSA Conference: Brighter, Secure Future, Now!
T.E.N. ISE® Success Track

November 7, 2019
8:00am - 5:00pm
The Loudermilk Center
40 Courtland Street Northeast
Atlanta, GA 30303
Registration
More Information

Healthcare on the Move: Using Security as a Business Enabler

10:00-10:45 am

Kanvinde_atul

Atul Kanvinde
Director, Clinical Applications
Children's Healthcare of Atlanta
Biography

Manikin_Stoddard

Stoddard Manikin
CISO & Director, Information Security
Children's Healthcare of Atlanta
Biography

To improve clinician to clinician communication, Children's Healthcare of Atlanta replaced the existing hospital communication solution to provide enhanced services, including: bar code scanning, secure messaging and integration with existing applications. The project set out to develop and implement the necessary clinical and infrastructure components to improve operational workflows in order to provide a seamless and secure means of communication and medication administration documentation. The Mobile Clinician Project rollout addressed both security and operational needs, helping prove the idea that security can be an enabler vs. a barrier. Join our conversation as the Children’s Healthcare of Atlanta Team shares how they combined multiple technologies that made patient care more efficient, addressed security and privacy concerns, and promoted mobility for their caregivers.

Weathering the Business Transformation Storm through Sturdy Leadership

11:00-11:45 am

Tony Spurlin

Tony Spurlin
VP & CSO
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

In life or business, there are many situations that when encountered, help drive us to meaning and understanding. This philosophy has been a driving force behind the security leadership of Tony Spurlin, VP and CSO for Windstream. In 2016, Windstream and Tony’s previous organization, Earthlink, merged together as one organization. Upon joining the Windstream team, he charged his security architecture team to work with identity management to evaluate the current challenges with regards to identity and access management and developed a comprehensive and rational plan to incrementally improve Windstream’s risk posture through approved and planned capital investments. Tony builds relationships and powerhouse teams that shape and enable all involved to succeed. Through his career, he has influenced and has grown many leaders across the industry that continue to succeed in their new respective companies and information security programs that continue flourish within these organizations. Tony continuously seeks out opportunities to collaborate with other Windstream organizations valuing the benefits of different perspectives and he finds that solutions to business challenges are most effective when melded into a comprehensive plan benefitting from different points of view and diverse experiences. Join Tony Spurlin as he shares his thoughts and experiences on information security teambuilding, effective board engagement, and hands-on leadership and problem-solving strategies.

ISE® Success Alumni Panel

11:45 am-1:00 pm

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Knight_Wes

Wes Knight
CISO
Georgia Department of Revenue
ISE® Southeast People's Choice Award Winner 2018
Biography

Manikin_Stoddard

Stoddard Manikin
CISO & Director, Information Security
Children's Healthcare of Atlanta
Biography

Tony Spurlin

Tony Spurlin
VP & CSO
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

More panlists to be announced!

Former ISE® Program Nominees—who have all been recognized as Finalists and/or Winners of the ISE® Program Awards—will participate in a panel discussing and providing advice on the best paths to success and innovation on security teams based on their experiences gained in their careers and at the ISE® Programs.

The CISO Sentinel: Security and Compliance Risk Management

1:30-2:15 pm

Knight_Wes

Wes Knight
CISO
Georgia Department of Revenue
ISE® Southeast People's Choice Award Winner 2018
Biography

The Georgia Department of Revenue Office of Information Security is responsible for securing a threat and regulatory landscape that encompasses multiple Federal mandates and 3rd Party Information Service providers. The CISO Sentinel is a security and compliance risk management platform that captures operating efficiencies in management of the program. Using continuous monitoring and management, the platform enables greater control of cybersecurity risks by effectively managing the processes associated with obtaining, identifying, processing and aggregating key information. Significant elements of the project focused upon prioritizing the review of critical security alerts, automating governance processes, eliminating redundant silos, and streamlining compliance and management reporting. Join our discussion to learn how the Georgia Department of Revenue Office of Information Security shifted their security paradigm from traditional paper based assessment outputs to a dynamic, actionable cybersecurity program.

Additional Sessions in Development!

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards 2019 will be held November 13-14, 2019 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details