Upcoming Events

ISE® VIP Welcome Reception with Shape Security at RSA® 2019
Security to Revenue: Manage Revenue, Not Risk

shape security


March 3, 2019
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
Register
More information

Automatic attacks on corporate web and mobile applications are an ever-growing epidemic that can affect not only your brand's reputation but your customer’s user experience as well. Join Shape Security for a conversation about how to prevent these attacks in a way that will reduce user friction and consequently improve your customer experience and create new revenue possibilities.

ISE® VIP Private Dinner with Demisto and Netskope at RSA® 2019
The Security Stack of the Future: From Ad-Hoc to Orchestrated

demisto
netskope


March 4, 2019
6:30 pm – 9:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
Register
More information

Current efforts to address the challenges of cybersecurity have involved arbitrary approaches with bolt-on technologies integrated through a best-effort approach. This piecemeal approach has both overwhelmed and exhausted security teams to the point where tools and alerts have just become noise. As businesses continue to embrace the cloud, security teams need to respond in a more agile manner. Join our conversation as we discuss balancing the needs of the business with an acceptable level of risk and establishing a more modern approach to provide visibility and security up and down the stack.

ISE® VIP Signature Luncheon with ServiceNow at RSA® 2019
Can Connecting IT, Security and Risk Enable a Best-in-Class Security and Integrated Risk Program?

servicenow


March 5, 2019
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

The breaches of the past few years continue to show us that organizations are overwhelmed and struggling with patching software vulnerabilities. But what if security teams were enabled to properly pinpoint the vulnerabilities that represent the most risk and align these risks with overall enterprise risk? Join our conversation as we discuss how organizations are connecting IT, security and risk through continuous monitoring for risks due to software vulnerabilities, resulting in dramatic improvements in both their security posture and integrated risk program.

ISE® VIP Reception with Agari at RSA® 2019
Trust Your Inbox Again

agari


March 5, 2019
7:00 pm - 10:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

Whether it is spear phishing attempts, business email compromise scams, account takeover-based attacks, or some other scheme capitalizing on the latest news headline or life event, fraudsters are here to stay—and they’re armed to the teeth with technology stacks familiar to any modern enterprise. As it stands, the average cost of a successful email attack can run your organization $1.6 million and up. If it leads to a data breach, you’re facing an average of $7.9 million in costs, according to Forbes—not to mention dilution of your brand, possible fines, and even criminal prosecution. To win the battle, we need to know our enemy. Instead of focusing on “the bad” by searching the entire threat surface of an organization to react to an attack in progress, it is important to begin understanding “the good” by looking at actual sender identity and defining trusted communications. By focusing on "the good" in real communications, it's possible to eliminate "the bad," even if the attack has never been seen before. Join us for an evening of connections and networking with your peers while we discuss the next generation of email security and regaining the confidence to open, click, and trust everything in your inbox.

T.E.N. & ISE® Sales and Marketing Breakfast at RSA® 2019
Why Relationships Matter: Best Practices for Connecting with Information Security Executives

ten


March 6, 2019
7:45 am – 10:00 am
Oren’s Hummus San Francisco
71 3rd St, San Francisco, CA 94103
Register
More information

In today’s cybersecurity-centric world, it’s no secret that CISOs are some of the busiest, most in-demand executives of all time, making appeals to the board for support and leading their teams through complex rollouts and management of their security programs. As well-funded cybersecurity programs have become a competitive and regulatory advantage in this era of security breaches and technological advancement, CISOs need to find the best security solutions that will help solve their enterprise’s unique challenges. In truth, most have little time to meet with vendors. Additionally, flashy emails, unsolicited cold calls, and other antiquated marketing tactics do not impress them and rarely lead to follow-up communications or meaningful interactions with vendors, let alone a sale. Most vendors believe that making the perfect pitch at the perfect time is the key to making a connection with CISOs, but the truth is much simpler yet also more complex: CISOs desire relationships with people they can trust. But how do you start building those relationships along with the trust that’s necessary to go along with them? What’s the best way for making introductions as timely and ethically as possible while also making the best first impression and to fast track your deal?

Find the answers to these important questions and more at T.E.N.’s ISE® Sales and Marketing Breakfast during the 2019 RSA® Conference. Our panel of executive thought leaders will share their real-world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation’s top IT and security executives.

ISE® VIP Signature Luncheon with Respond Software at RSA® 2019
Which of the Status Quos in Security Needs to Be Broken?

respond software


March 6, 2019
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

Cybersecurity did not always have a status quo. IT professionals merely created best practices and shared them with the best of intentions. Because these practices and procedures worked at the time, we’ve been clinging to them ever since, even though they often create operational roadblocks and headaches and don’t always keep businesses safe. Why are common procedures and old beliefs about security lingering even though they are clearly outdated or outright wrong to continue? Join our conversation as we discuss security practices involving business, organization, operations, technology, and marketing, answering the questions of why certain activities persist despite being past their due date and how we can overcome the status quo.

ISE® VIP Reception with Digital Guardian at RSA® 2019
A 1-2 Punch: Data Loss Prevention and Endpoint Detection & Response

digital guardian


March 6, 2019
6:30 pm - 8:30 pm
Gallery 16
501 3rd Street
San Francisco, CA 94107
Register
More information

Your business relies on data to grow; you need a way to understand all the risks targeting that data to support your security teams and senior leadership into making informed business decisions. Only Digital Guardian delivers a 1-2 punch of consolidated Data Loss Prevention and Endpoint Detection & Response so your security team can find, understand, and protect your enterprise’s data without excess cost or complexity. Your enterprise will be able to target and resolve security alerts that matter in real time, all with the aid of security analyst-approved workspaces, making next steps easier for your security team to determine. Join our conversation as we discuss how you and your security team can employ a purpose-built, SaaS platform that focuses on mitigating risks to your sensitive data and eliminates the need to waste time worrying about the infrastructure.

ISE® VIP Signature Luncheon with Cisco at RSA® 2019
The Threat Is Real: Pushing the Boundaries of Threat Intelligence

cisco


March 7, 2019
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register
More information

As the digital world continues to expand at an alarming rate, attackers gain more opportunities and resources to effectively breach defenses. To protect against these threats, enterprises must go beyond tracking and detection to explore and advance today’s security technologies, so they can defend against tomorrow’s exploits. Security teams need threat intelligence and detection technologies to inform and defend their customer base from the latest malware and ransomware attacks before these threats blindside them. To do so requires security teams to have threat visibility in their email, networks, cloud, endpoints, and everything in between, allowing them to have a proactive approach and superior protection. However, security teams are already understaffed, struggling with the lack of experienced talent within the industry. By focusing on the right technology and processes, executives can alleviate this pain point and harness their teams to perform effectively, even as the search for people with desired skillsets continues. Join our conversation as we discuss comprehensive intelligence against the latest threats, innovative detection technologies, and how security executives can use them both to bolster their current teams and locate the right talent to fill the gaps.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 19, 2019
5:30pm - 8:30pm
American Cut Steakhouse
3035 Peachtree Rd NE #140
Atlanta, GA 30305
Registration

Keyaan Williams
CEO
Cyber Leadership and Strategy Solutions, LLC
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

March 20, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Registration
Jim Nelms

Moriah Hara
Global CISO
Interpublic Group
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 21, 2019
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Registration
Khalfan_Shaun

Shaun Khalfan
VP, Information Security
Freddie Mac
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

March 26, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

March 28, 2019
5:30pm - 8:30pm
J&G Steakhouse
The Phoenician Scottsdale
6000 E Camelback Rd
Scottsdale, AZ 85251
Registration

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

April 4, 2019
5:30pm - 8:30pm
One Market
1 Market Street
San Francisco, CA 94105
Registration
Selim Aissi

Selim Aissi
Senior Vice President & Chief Security Officer
Ellie Mae
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 9, 2019
5:30pm - 8:30pm
Murray’s
26 South 6th Street
Minneapolis, MN
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 10, 2019
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
4322 W Boy Scout Blvd.
Tampa, FL 33607
Registration

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

April 17, 2019
5:30pm - 8:30pm
Morton's The Steakhouse - Downtown Houston
1001 McKinney St
Houston, TX 77002
Registration

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 24, 2019
5:30pm - 8:30pm
St. Elmo Steak House
127 S. Illinois St.
Indianapolis, IN 46225
Registration

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® Central Executive Forum and Awards 2019

The ISE® Central Executive Forum and Awards 2019 will be held May 15, 2019 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2019 will be held August 22, 2019 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2019

The ISE® Northeast Executive Forum and Awards 2019 will be held October 3, 2019 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards 2019 will be held November 13-14, 2019 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details