ISE® PRIVATE DINNER: Enable Communication & Collaboration Without Sacrificing Security
Zachary Ross
Senior Technical Program Manager
Risk Management Services
Amazon
Biography
Today’s security leader is responsible for more than just locking down the perimeter. You must find innovative methods to securely enable business and streamline collaboration, often between numerous facilities and teams scattered around the globe. Unified communication and eCollaboration tools have revolutionized connectivity and productivity, but can also create infrastructure and security challenges for the enterprise. Join our conversation to examine strategies for employing these tools to improve business operations without creating additional risk or sacrificing security.
Executive Roundtable and Reception: Speed & Security — Why CISOs Want an Agile SDLC
Dan Swartwood
Information Security Governance Leader
Mars
Biography
The future of business is eCommerce. Regardless of industry, size or purpose, more companies and organizations rely on the World Wide Web for transactions and customer engagement than ever before. However, conducting business online requires a fast-paced development process and high demand for services allows minimal downtime for updates and patching. Security must be built into the SDLC from the beginning. Join our roundtable conversation to examine why CISOs and their teams are shifting to a more agile development process and discuss why embedding security early and throughout the SDLC can prevent severe, costly consequences down the road.
ISE® PRIVATE DINNER
Putting Vulnerability and Risk Information in the Context of Business
John Masserini
Chief Security Officer
MIAX Options
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010
Biography
Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.
ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
Ramses Martinez
Director of Security
Yahoo!
Biography
Join us for this opportunity to discuss candidly the most serious issues facing information security executives today. Hear from your peers how they are addressing advanced threats from internal, external and global sources. And share your insight on protecting your enterprise in an evolving threat landscape.
ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?
Derek Rude
IT Director
Weatherford
Biography
Although the NSA leaks by Edward Snowden will likely be remembered as one of the most significant breaches in history, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an “inside-out” model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.
ISE®PRIVATE DINNER: Risky Business – Why DLP Should be Fundamental to Your Security Strategy
Arthur Lessard
SVP, Chief Information Security Officer
Universal Music Group
Biography
Craig Froelich
SVP, Head of Cyber Security Technology
Bank of America
Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.
ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business
David Barton
Senior Director & Head of Information Security
HireRight
Biography
Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.
NIST Cybersecurity Framework Town Meeting Web Conference
4:00pm - 5:00pm
Web conference
Phil Agcaoili
VP, Chief Information Security Officer
Elavon, Inc.
ISE® Central Executive Award Winner 2009
ISE® of the Decade Southeast Award Winner 2012
Biography
Security industry leaders are apprehensively considering implementation of the highly ambitious milestones that are part of the NIST Cyber Security Framework, which includes standards procedures, and guidelines to align business, policy, and technological approaches to cyber risk. With huge changes potentially looming in the not-so-distant future, it is more important than ever for executive thought leaders to communicate and collaborate to ensure the framework enhances security efforts, instead of complicating them by imposing a one-size-fits-all model. During this virtual conversation, CISOs and CSOs from across the U.S. will take a candid look at the preliminary NIST Cybersecurity Framework, discuss possible ideas for improvement, and collectively generate meaningful feedback and suggestions and for the NIST.
Join Phil Agcaoili and other security industry thought leaders for the “NIST Cybersecurity Framework Town Meeting” via web conference from 4-5 p.m. EST on Tuesday, Nov. 19. During this virtual conversation, CISOs and CSOs from across the U.S. will take a candid look at the preliminary NIST Cybersecurity Framework, discuss possible ideas for improvement, and collectively generate meaningful feedback and suggestions and for the NIST.
ISE® PRIVATE DINNER: The questions you aren’t asking about BYOD — but should be!
Justin Somaini
CISO
Yahoo!
Biography
Many organizations are entirely reactive to BYOD, responding only as pressure from users increases, but BYOD is becoming the standard. Failing to proactively address such a vital issue from both policy and technology standpoints will dramatically diminish your capacity to manage risk. But what are your organization’s unique challenges? How can the element of bring-your-own-software (BYOS) on potentially unknown devices further compromise your network? What role will automation play and how can you enforce policies? Join us for this engaging conversation to learn what questions you should be asking when planning your BYOD strategy in order to ensure success.
ISE® PRIVATE DINNER: Every Second Matters: Using Real-Time Intelligence to Expose Threats
Nick Nedostup
Vice President
Cyber Intelligence Operations Center
Equifax
Biography
In the blink of an eye, malicious threats can wreak havoc throughout your network causing virus outbreaks and major outages that result in substantial costs and compromise employees' time and your organization's reputation. Your team needs instant visibility and accurate, real-time information about the state of your computing assets in order to identify and mitigate threats proactively. But in today's evolving threat landscape, real time is measured in seconds - not hours or days. Join our conversation to discuss the best practices and innovative technology that enable you to collect and utilize this valuable intelligence to preemptively address threats and ultimately improve operational processes, reduce costs and streamline business.
ISE® NORTH AMERICA PRIVATE DINNER
Why Public/Private Partnerships are Key to the Future of Cyber Security
5:30pm - 8:30pm
The Capital Grille at Tyson’s Corner
1861 International Drive
McLean, VA 22102
Shelbi Rombout
Cybersecurity Partnership Executive
U.S. Bank
Biography
From the boardroom to the situation room, cyber security has become a globally visible and divisive issue. As both business and government become increasingly reliant on technology, the need for a strong cyber security framework to protect critical infrastructure also escalates. Although the federal government has initiated legislation to address this hot button issue, the response to today’s cyber threats cannot be limited to Washington. It is an issue of both national and economic security. Join our conversation as we examine why public/private partnerships are a key driver in safeguarding critical assets, managing risk and enabling continued economic growth in environment that protects and nurtures innovation.
ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business
Franklin Donahoe
Director, Information Security
Costco Wholesale Corporation
Biography
Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.
ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage
5:30pm - 8:30pm
Coach Insignia
Floors 71 & 72
100 Renaissance Center
Detroit, MI 48243
Bradley Maiorino
Chief Information Security & Risk Officer
General Motors
Biography
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.
ISE® PRIVATE DINNER
Moving from Battalions to SEAL Teams: Shifting Strategies in the Security Talent War
Brenda Calloway
Executive Director of Information Security
Health Care Service Corporation
ISE® Central Executive Award Finalist 2010
Biography
The challenge of finding, grooming and retaining the best security talent is not new. But as organizations adapt to today’s threat landscape, many find it more difficult than ever to hire enough talent to meet their growing needs. Ensuring the highest yield from each valuable asset is now vital for the CISO. In fact, a recent National Audit Office report indicates it could take 20 years to plug the current cybersecurity skills gap. Join our conversation to discover strategies for increasing the ROI on your existing security team, and discuss ways to reduce your future staffing needs by improving utilization of your biggest asset – the team you have today.
ISE® PRIVATE DINNER: Security in the Data Center
Christine Thomas
VP of Technology and Production Infrastructure,
CTO Office for the Entertainment Services Division
Technicolor
Biography
The security of your data center is central to enterprise operations — imperative to sustaining data integrity, maintaining business continuity, and protecting critical information. The convergence of mobile, cloud and traditional technology along with an increasingly transient and dispersed workforce demands an innovative, multi-layered approach. Join the conversation to discover how NextGen CIOs and CISOs can address the evolving complexity of data center security in order to simplify network operations, ensure productivity and enable business.
ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage
Steve Collignon
Chief Information Security Officer
Senior Vice President, Enterprise Services
Cardinal Health
Biography
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.
ISE® PRIVATE DINNER: Security in the Data Center
Kevin DePeugh
Vice President, Cyber Security
Kaiser Permanente
Biography
The security of your data center is central to enterprise operations — imperative to sustaining data integrity, maintaining business continuity, and protecting critical information. The convergence of mobile, cloud and traditional technology along with an increasingly transient and dispersed workforce demands an innovative, multi-layered approach. Join the conversation to discover how NextGen CIOs and CISOs can address the evolving complexity of data center security in order to simplify network operations, ensure productivity and enable business.
ISE® NORTHEAST PRIVATE WELCOME DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Dr. Yonesy F. Nuñez
SVP, Corporate Center IS Risk Management, Global Information Security
CITI
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, " Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business, " learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER
Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!
Max Morris
Senior Vice President
Manager, Cyber Security & Threat Intelligence
Regions Bank
ISE® North America Executive Award Finalist 2009
ISE® Southeast Executive Award Finalist 2009
ISE® North America Executive Award Finalist 2008
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now! " learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER: Big Data and Security
5:30pm - 8:30pm
The Palm Restaurant
Westin Hotel in Buckhead
3391 Peachtree Road, NE
Atlanta, Georgia 30326
Ruben D. Chacon
Director of Information Protection
Information Risk Management, Global IT
The Coca-Cola Company
Biography
Symantec and Accenture host this special program for the area's leading Information Security Executives® to candidly discuss "Big Data and Security." Explore how organizations are prioritizing and quickly responding to the most critical vulnerabilities that threaten their business by establishing a security strategy and roadmap that includes continuous, up-to-date insight across the security stack and provides actionable, orchestrated security intelligence by leveraging existing or new security infrastructure.
CYBERSTRAT 13 NYC - The Art of Cyberwar: Managing Complexity
5:30pm - 8:30pm
Westin Times Square
270 West 43rd Street
New York, NY 10036
Details
John Pescatore
Director of Emerging Security Trends
SANS/Gartner
Biography
Our digital dependence breeds vulnerabilities that can be exploited by criminals, hackers, hacktivists, and well-resourced nations and non-state organizations; therefore, our critical systems must be robust in the face of motivated persistent hackers and resilient enough to withstand attacks and quickly recover. As threats continue to evolve in complexity and frequency, we must develop and deploy both offensive and defensive tactics as part of a balanced cyber security strategy in order to protect the enterprise.
ISE® CANADA PRIVATE WELCOME DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
Kenneth Haertling
VP & Chief Security Officer
TELUS
ISE® Canada Executive Award Finalist 2013
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business, "learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER: Why the CISO’s Role is Fundamental to Software Security
Jasper Ossentjuk
Chief Information Security Officer
HSBC North America
Biography
The security landscape has changed considerably in recent years and sophisticated attackers have become adept at exploiting software bugs and architectural flaws in software applications. It is more important than ever to integrate security throughout the SDLC in order to ensure the long-term protection of sensitive information and reduce the cost of remediation. The CISO plays a fundamental role in developing an organization’s comprehensive security strategy and is the key driver for incorporating security principals into the development process. Learn how to foster a commitment to security within the development community and how to best protect your software against threats with an end-to-end software security program.
ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage
Steven Jensen
VP and Chief Information Security Officer
Ameriprise Financial
ISE® North America Commercial Executive Award Finalist 2013
Biography
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.
ISE® PRIVATE DINNER: Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Denise Hucke
Vice President, Global Operational Risk
ADP
Biography
Skip Foss
COO and General Manager
Norse Corporation
Biography
Sponsored by Norse Corporation, this special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, "Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.
ISE® PRIVATE DINNER: Empower Business by Embracing Mobility
Robert Stonehouse
Managing Director, Information Security
TMX Limited
Biography
The growing use of smartphones and tablets along with Bring Your Own Device (BYOD) initiatives are fundamentally changing the way we do business. However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. This discussion will explore strategies for embracing BYOD in business without compromising on security, so that employees can capitalize on mobility’s many benefits — improved productivity, collaboration and innovation.
ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business
Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
ISE® Northeast Executive Award Finalist 2014
ISE® North America Executive Award Winner 2014 - Health Care Category
Biography
Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.
ISE® West Welcome Dinner
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
Joe Bennett
CISO, VP of Enterprise IT and Information Security
YP
Tucker, GA
Biography
Laz Lazarikos
IT Security Strategist and Former CISO
Sears Online Business Unit
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business," learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® VIP Programs at Black Hat Conference 2013
Las Vegas, NV
T.E.N. is hosting several ISE VIP Programs at the 2013 Black Hat Conference in Las Vegas. Hosted by many of our ISE Alumni and courtesy of our sponsors, these programs include special breakfast and and exclusive receptions. Details
ISE® PRIVATE DINNER: Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!
Stacey Halota
Vice President, Information Security and Privacy
The Washington Post
ISE® Mid-Atlantic Commercial Executive Award Winner 2009
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business
Kyle Bellin
VP, Information Security and Privacy
Popular Community Bank
Biography
Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.
ISE® PRIVATE DINNER
Long Story Short: Secure Mobility is About the Data
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
5061 Westheimer Road, Suite 8060
Houston, Texas 77056
Adam Ely
Co-Founder & COO
Bluebox
Biography
The dinner discussion, "Long Story Short: Secure Mobility is About the Data," will address the challenges of mobile device management. Join us to learn more about the first MDM solution to deliver transparent corporate control and visibility of data with a brilliant user experience and find out why Bluebox was listed as one of “CIO's 12 Must-watch Security Start-ups for 2013."
ISE® PRIVATE DINNER
The Principles of Persistence: How Attackers Remain in the Network
Craig Shumard
Principal
Shumard Associates
ISE® Tri-State Award Winner 2005
ISE® Luminary Leadership Award Winner 2010
Biography
T.E.N. Success Story
Targeted attacks against companies differ from disruptive malware incidents in that there is an attacker at the keyboard. The risk and severity of these types of attacks can also have a far greater negative financial impact to a company because the attacker’s goal is to attain and maintain unauthorized access despite the use of traditional security tools. There is great value in information and they are highly motivated to have access to it. Whether it is exfiltrating sensitive IP or gathering intelligence for a competitive advantage, their ability to maneuver freely and remain undetected ensures they are able to profit at your expense for years. This discussion will feature an engaging peer discussion regarding best practices for detecting nefarious infiltration, identifying lateral movement techniques and responding to advanced persistent attacks within your network.
ISE® PRIVATE DINNER: Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence
Kyle Duke
Information Security Officer
HealthSpring
ISE® Southeast People's Choice Award Winner 2010
Biography
T.E.N. Success Story
Skip Foss
COO and General Manager
Norse Corporation
Biography
Denise Hayman
Senior Vice President of Sales and Marketing
Norse Corporation
Biography
Sponsored by Norse Corporation, this special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, "Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.
ISE® PRIVATE DINNER
Long Story Short: Secure Mobility is About the Data
5:30pm - 8:30pm
The Palm Restaurant
Westin Buckhead Hotel
3391 Peachtree Road, NE
Atlanta, GA 30326
Tony Spurlin
CISO & Director of Information Security
Autotrader Group
Atlanta, GA
ISE® North America People's Choice Award Winner 2005
Biography
Caleb Sima
CEO and Founder
Bluebox
Biography
The dinner discussion, "Long Story Short: Secure Mobility is About the Data," will address the challenges of mobile device management. Join us to learn more about the first MDM solution to deliver transparent corporate control and visibility of data with a brilliant user experience and find out why Bluebox was listed as one of “CIO's 12 Must-watch Security Start-ups for 2013."
ISE® PRIVATE DINNER: Compliance Does not Equal Security
Dick Langford
VP, Information Security Officer
BB&T
Biography
This special dinner will provide for a candid exchange of the hottest issues for today's leading Information Security Executives®. Our dinner topic of conversation, "Compliance Does not Equal Security," will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT and social media.
ISE® PRIVATE DINNER
Making the GRC Grade How to Realize Continuous Compliance
Kevin McGee
Senior Vice President, IT Governance and CISO
CIT Group
Biography
Sponsored by McAfee & ForeScout, this special dinner, "Making the GRC Grade: How to Realize Continuous Compliance," will provide a forum for candid discussions regarding innovative approaches you can use to not only better effectuate IT-GRC controls, but also achieve continuous compliance. Key topics will include common endpoint compliance gaps; NAC integration with host-based security and policy management systems; extension of correlation rules to expedite IT response and remediation; and closed-loop endpoint security and compliance program creation.
ISE® PRIVATE DINNER: Protecting Data Anywhere
6pm - 9pm
Delmonico Steakhouse
The Venetian
3355 Las Vegas Blvd South
Las Vegas, NV 89109
Julie Talbot-Hubbard
VP, Chief Security Officer
Symantec
ISE® Central Executive Award Winner 2010
Biography
T.E.N. Success Story
Hosted by Symantec and HP, this special dinner discussion, "Protecting Data Anywhere," will be held concurrent with the HP Discover Conference. (Note: Conference pass not required for attendance.) During the conversation we will explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® Central Private Welcome Dinner
Kenneth Haertling
VP & Chief Security Officer
TELUS
ISE® Canada Executive Award Finalist 2013
Biography
Sponsored by Stonesoft, this special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business," learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER
Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence
5:30pm - 8:30pm
ABSINTHE Brasserie & Bar
398 Hayes Street @ Gough
San Francisco, CA 94102
Sam Glines
Co-founder & CEO
Norse Corporation
Biography
This special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, ;"Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.
ISE® PRIVATE DINNER: Compliance Does not Equal Security
Bob Quandt
Information Security Executive Director
Healthways
Biography
This special dinner will provide for a candid exchange of the hottest issues for today's leading Information Security Executives®. Our dinner topic of conversation, "Compliance Does not Equal Security," will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT and social media.
ISE® PRIVATE DINNER: Protecting Data Anywhere
Todd Fitzgerald
Director of Global Information Security
Manpower Group
2005 ISE® Central Finalist
2006 ISE® Central MC & Judge
2008 ISE® West MC
2012 ISE® North America MC
Security Author
Biography
Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
Collabor8: Enabling BYOD without Sacrificing Network Security
Artie Wilkowsky
Director of Global Information Assurance & Risk
First Data Corporation
Biography
This living room style discussion will provide for a candid discussion on one of the industry’s hottest topics, "Enabling BYOD Without Sacrificing Network Security.” Productivity and flexibility versus data and network protection — it’s the perpetual challenge Information Security Executives® face with a growing demand for personal devices in corporate environments. Join us as we explore how embracing employee-owned devices in the corporate environment does not need to be an all or nothing approach, but rather how your business can take incremental steps to protect the network while still giving your employees the access they want to be productive in an always-on work environment.
ISE® PRIVATE DINNER: Protecting Data Anywhere
Roland Cloutier
Vice President, Chief Security Officer
ADP
ISE® Northeast Executive Award Winner 2012
ISE® Northeast People's Choice Award Winner 2012
ISE® North America Commercial Executive Award Winner 2012
ISE® North America Executive Award Winner 2014 - Financial Category
Biography
T.E.N. Success Story
Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
Michael Dierickx
Director Product Information Security
Panasonic Avionics Corporation
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER
The Principles of Persistence: How Attackers Remain in the Network
5:30pm - 8:30pm
Ruth's Chris Steak House
The Embassy Suites Buckhead
3285 Peachtree Rd NE
Atlanta, GA 30305
Tim Callahan
Senior Vice President, Enterprise Business Continuity and Information Assurance,
SunTrust
ISE® Northeast People's Choice Award Winner 2009, ISE® North America Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2007, ISE® Southeast People's Choice Award Winner 2006, ISE® Southeast Executive Award Finalist 2006
Biography
T.E.N. Success Story
Targeted attacks against companies differ from disruptive malware incidents in that there is an attacker at the keyboard. The risk and severity of these types of attacks can also have a far greater negative financial impact to a company because the attacker’s goal is to attain and maintain unauthorized access despite the use of traditional security tools. There is great value in information and they are highly motivated to have access to it. Whether it is exfiltrating sensitive IP or gathering intelligence for a competitive advantage, their ability to maneuver freely and remain undetected ensures they are able to profit at your expense for years. This discussion will feature an engaging peer discussion regarding best practices for detecting nefarious infiltration, identifying lateral movement techniques and responding to advanced persistent attacks within your network.
ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
Frank Aiello
Chief Information Security Officer
American Red Cross
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER
Making the GRC Grade How to Realize Continuous Compliance
Eric Fisch
Senior Vice President, Information Security
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013
Biography
Sponsored by McAfee & ForeScout, this special dinner, "Making the GRC Grade: How to Realize Continuous Compliance," will provide a forum for candid discussions regarding innovative approaches you can use to not only better effectuate IT-GRC controls, but also achieve continuous compliance. Key topics will include common endpoint compliance gaps; NAC integration with host-based security and policy management systems; extension of correlation rules to expedite IT response and remediation; and closed-loop endpoint security and compliance program creation.
ISE® PRIVATE DINNER
Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street
Suite C-110
Charlotte, NC 28202
Sam Glines
Co-founder & CEO
Norse Corporation
Biography
This special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, ;"Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.
ISE® PRIVATE DINNER: Bringing IT Back to Relevance
John Rymer
VP, Principal Analyst Serving Application
Development & Delivery Professionals
Forrester
Biography
The pressure to deliver new, innovative business applications has never been greater for IT organizations. Imagine being able to alleviate reoccurring maintenance issues and respond immediately to rapidly changing business requests – all while improving the overall efficiency and abilities of core systems to work and integrate with each other. Isn’t it about time to transform your IT department into a business differentiator and center of innovation?
ISE® PRIVATE DINNER
Building Consensus - How do you establish a common set of Information Security facts?
5:30pm - 8:30pm
Z’s Oyster Bar and Steakhouse
115 South 4th Street
Louisville, KY 40202
Chuck Deaton
Director, Enterprise Information Security
Humana
Biography
This special dinner will provide for a candid exchange of the dinner topic of conversation, "Building Consensus - How do you establish a common set of Information Security facts?" will share strategies for establishing a consistent and common sets of facts from data that can be can be leveraged for a cross section of audiences and stakeholders, as well as best practices utilizing continuous monitoring to address the new threats of today and tomorrow.
ISE® PRIVATE DINNER
The Principles of Persistence: How Attackers Remain in the Network
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Craig Shumard
Principal
Shumard Associates
ISE® Tri-State Award Winner 2005
ISE® Luminary Leadership Award Winner 2010
Biography
T.E.N. Success Story
Targeted attacks against companies differ from disruptive malware incidents in that there is an attacker at the keyboard. The risk and severity of these types of attacks can also have a far greater negative financial impact to a company because the attacker’s goal is to attain and maintain unauthorized access despite the use of traditional security tools. There is great value in information and they are highly motivated to have access to it. Whether it is exfiltrating sensitive IP or gathering intelligence for a competitive advantage, their ability to maneuver freely and remain undetected ensures they are able to profit at your expense for years. This discussion will feature an engaging peer discussion regarding best practices for detecting nefarious infiltration, identifying lateral movement techniques and responding to advanced persistent attacks within your network.
ISE® PRIVATE DINNER : Security Metrics Aligned with Business Initiatives
Robert Allen
Chief Information Security Officer
CNA Insurance
Biography
Business initiatives often require investments in IT security, yet those investments are not always fully understood or supported by executive leadership and boards of directors. Successful security leaders are able to frame these investments in terms of business advantages, which helps other organizations and non-security professionals comprehend business alignment between budget support for IT security and business initiatives. During our dinner conversation, "Security Metrics Aligned with Business Initiatives," discuss with your executive peers best practices for leveraging security performance metrics to enable and support business decisions and key initiatives.
ISE® PRIVATE DINNER: Protecting Data Anywhere
Cris Ewell
Chief Information Security Officer
Seattle Children's
ISE® North America Health Care Executive Award Winner 2012
Biography
Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® SOUTHEAST PRIVATE WELCOME DINNER: Applying Cyber Offense and Defense to Protect Business
5:30pm - 8:30pm
The Palm Restaurant at the
Westin Buckhead Hotel
3391 Peachtree Road, NE
Atlanta, Georgia 30326
Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® VIP Programs at RSA Conference 2013
T.E.N. had several ISE VIP Programs at the 2013 RSA Conference held February 24 - 28, 2013 in San Francisco. Hosted by many of our ISE Alumni and courtesy of our sponsors, these programs included special breakfast and private luncheons; premiere seating at RSA keynote presentations and exclusive receptions. Details
ISE® PRIVATE DINNER: Protecting Data Anywhere
Connie Barrera
Director of Information Security and Compliance
University of Miami
ISE® North America Executive Award Finalist 2013 - Academic/Public Sector Category
Biography
Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
John Masserini
Chief Security Officer
Miami International Holdings
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
Collabor8: Enabling BYOD without Sacrificing Network Security
Gene Scriven
Chief Information Security Officer and Vice President
Sabre Holdings
ISE® Southeast People’s Choice Award Winner 2008
ISE® Southeast Executive Award Finalist 2008
Biography
T.E.N. Success Story
The dinner topic of conversation, "Enabling BYOD without Sacrificing Network Security" will explore how embracing employee-owned devices in the corporate environment does not need to be an all or nothing approach, but rather how your business can take incremental steps to protect the network while still giving your employees the access they want to be productive in an always-on work environment.
ISE® PRIVATE DINNER: Big Data and Security
5:30pm - 8:30pm
Fleming’s Prime Steakhouse and Wine Bar
210 East Trade Street Suite C110
Charlotte, NC 28202
Rich Baich
Chief Information Security Officer, Enterprise Technology Services
Wells Fargo & Company
ISE® Georgia Executive Award Winner 2004
Biography
Symantec hosts this special program for the area's leading Information Security Executives® to candidly discuss "Big Data and Security." Explore how organizations are prioritizing and quickly responding to the most critical vulnerabilities that threaten their business by establishing a security strategy and roadmap that includes continuous, up-to-date insight across the security stack and provides actionable, orchestrated security intelligence by leveraging existing or new security infrastructure. This program will be tailored to primarily address current issues and hot topics faced by security executives in the financial services industry.
ISE® PRIVATE DINNER: Protecting Data Anywhere
5:30pm - 8:30pm
Fleming’s Prime Steakhouse and Wine Bar
210 East Trade Street Suite C110
Charlotte, NC 28202
Bobby Singh
Associate Vice President, Security Program Executive
ISE® Canada People's Choice Award Winner 2013
Biography
Symantec and HP Enterprise Services host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business
5:30pm - 8:30pm
Smith & Wollensky
4007 Westheimer at Highland Village
Houston, TX 77027
Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
ISE® Southeast People's Choice Award Winner 2014
Biography
This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
ISE® PRIVATE DINNER: Protecting Data Anywhere
5:30pm - 8:30pm
Chamberlain's Fish Market Grille
4525 Belt Line Road
Addison, TX 75001
Scott Howitt
VP, CISO
J.C. Penney
ISE® Central Executive Award Winner 2012
Biography
T.E.N. Success Story
Symantec and HP Enterprise Services host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® PRIVATE DINNER: Enabling BYOD without Sacrificing Network Security
5:30pm - 8:30pm
Absinthe Brasserie & Bar
398 Hayes Street at Gough
San Francisco, CA 94102
Niall Browne
CSO & VP of Information Security
Workday
Biography
The dinner topic of conversation, "Enabling BYOD without Sacrificing Network Security" will explore how embracing employee-owned devices in the corporate environment does not need to be an all or nothing approach, but rather how your business can take incremental steps to protect the network while still giving your employees the access they want to be productive in an always-on work environment.
ISE® TV Premier: The Value of Predictive Security Intelligence
Mike Yaffe
Director of Marketing
Core Security
Biography
Jerry Archer
Senior Vice President, Chief Information Security Officer
Sallie Mae
ISE® North America Commercial Executive Award Winner 2011
Biography
Pete Lindstrom
Research Director Security Products
IDC
Biography
This exciting new opportunity brings the knowledge and value you expect from ISE® Programs into a convenient, online format easily accessed from your office or mobile device. Join our experts for this unique program as they examine the integration of full-scale attack planning, threat simulation and attack replication for the purpose of garnering upper-management support, optimizing efficiency and investments in people and technology, and uniting security and business risks. Afterward, continue the conversation online for a candid peer discussion about "The Value of Predictive Security Intelligence.”
ISE® PRIVATE DINNER : A New Paradigm for Data Protection
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Mark Risoldi
Managing Director
JP Morgan Chase & Co.
Biography
Our dinner topic of conversation, “A New Paradigm for Data Protection,” will address the latest strategies for best protecting your most critical asset — your data. Learn to unlock the value of your data by securely using and distributing it across any device to any stakeholder; and move away from traditional IT security methodologies, enabling open use and management of data in the most secure manner.
ISE® PRIVATE DINNER: Protecting Data Anywhere
5:30pm - 8:30pm
Ruth’s Chris Steak House
The Embassy Suites Buckhead
3285 Peachtree Rd NE
Atlanta, GA 30305
Phil Agcaoili
Chief Information Security Officer
Cox Communications
ISE® Central Executive Award Winner 2009
ISE® of the Decade Southeast Award Winner 2012
Biography
Symantec and HP Enterprise Services host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.
ISE® PRIVATE DINNER : Risk is a Four Letter Word
5:30pm - 8:30pm
Z's Oyster Bar & Steakhouse Downtown
115 South 4th Street
Louisville, KY 40202
Stacy Mill
Director, Global IT Security
YUM! Brands, Inc.
Biography
Sponsored by HP Enterprise Services, the program will provide a private forum for the area’s leading Information Security Executives® to candidly discuss many of the industry’s hottest issues. Our dinner topic of conversation, "Risk is a Four Letter Word" will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT, and social media.
ISE® PRIVATE DINNER: Big Data and Security
Cynthia Whitley
Information Technology Risk Officer and Compliance Leader
Allstate
ISE® Central Finalist 2008
Biography
Symantec and Accenture host this special program for the area's leading Information Security Executives® to candidly discuss "Big Data and Security." Explore how organizations are prioritizing and quickly responding to the most critical vulnerabilities that threaten their business by establishing a security strategy and roadmap that includes continuous, up-to-date insight across the security stack and provides actionable, orchestrated security intelligence by leveraging existing or new security infrastructure.
ISE® PRIVATE DINNER: Compliance Does not Equal Security
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
& Wine Bar
103 Summit Blvd.
Birmingham, AL 35243
Tim Searcy
Chief Information Security Officer
Protective Life
Biography
This special dinner will provide for a candid exchange of the hottest issues for today's leading Information Security Executives®. Our dinner topic of conversation, "Compliance Does not Equal Security," will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT and social media.