Archived Events 2014

ISE® PRIVATE DINNER
Real-time Answers; Real-time Action: Your Solution to Better Incident Response

December 4, 2014
5:30pm - 8:30pm
Trump International Hotel
The Exchange Floor - Wall Street
325 Bay Street
Toronto, ON M5H 4G3

Vivek Khindria
Head of Information Security
Bell Canada
Biography

Malware has evolved and as the current threat landscape has changed, the standard endpoint security technology no longer is sufficient. In order to effectively protect and defend your assets, the ability to query and respond in real-time is needed to mitigate these threats. The greatest challenge is most organizations lack a true “real-time” view of the enterprise with visibility into unmanaged assets on their network. Additionally, relying on information that is days or even weeks old makes it impossible to find the answers you need to take immediate action. Join our conversation to discuss how instant access to complete, real-time data can transform your incident response strategy by enabling your team to ask questions, get immediate answers and take instant action to remediate while the incident is still occurring.

ISE® PRIVATE DINNER
Aligning Vulnerability and Privilege Management in the Context of Business Risk

December 3, 2014
5:30pm - 8:30pm
Charley's Steak House
4444 West Cypress Street
Tampa, FL 33607
Jay Schwitzgebel

Jay Schwitzgebel
VP, Chief Information Security Officer
HealthPlan Services
Biography

Despite gigantic investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts of data. CISOs need new strategies for assessing, prioritizing and addressing both internal and external risks in business context. Join our conversation to discuss how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

ISE® PRIVATE DINNER
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

November 18, 2014
5:30pm - 8:30pm
Fleming’s Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Bob Varnadoe

Bob Varnadoe
Chief Information Security Officer
NCR
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

November 13, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 W Olive Ave
Burbank, CA 91505
Geoffrey Aranoff

Geoffrey Aranoff
Chief Information Security Officer
Broadcom Corporation
ISE® West Executive Award Finalist 2008
Biography

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

November 12, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036s
Roland Cloutier

Roland Cloutier
Vice President, Chief Security Officer
ADP
ISE® Northeast Executive Award Winner 2012
ISE® Northeast People's Choice Award Winner 2012
ISE® North America Commercial Executive Award Winner 2012
ISE® North America Executive Award Winner 2014 - Financial Category

Biography
T.E.N. Success Story

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® NORTH AMERICA PRIVATE WELCOME DINNER
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

November 4, 2014
5:30pm - 8:30pm
The Grille at Morrison House
116 South Alfred Street
Alexandria, VA 22314
Jerry Archer

Jerry Archer
Senior Vice President, Chief Information Security Officer
Sallie Mae
ISE® North America Commercial Executive Award Winner 2011
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® North America Leadership Summit and Awards 2014

ISE Awards

The ISE® North America Leadership Summit and Awards will be held on November 5-6, 2014 at the Westin Alexandria, VA. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

October 29, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
2222 McKinney Ave
Dallas, TX 75201
Scott Howitt

Scott Howitt
VP, CISO
J.C. Penney
ISE® Central Executive Award Winner 2012
Biography
T.E.N. Success Story

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

October 16, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
25 East Ohio St.
Chicago, IL 60611
Brenda Calloway

Brenda Calloway
Executive Director of Information Security
Health Care Service Corporation
ISE® Central Executive Award Finalist 2010
Biography

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® PRIVATE DINNER
The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

October 15, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
4322 W Boy Scout Blvd
Tampa, FL 33607
Bobby Dominguez

Bobby Dominguez
Chief Information Risk Officer, SVP
PNC Bank
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® PRIVATE DINNER
Real Life War Games: Avoiding the High-profile Mega Breach

October 13, 2014
5:30pm - 8:30pm
Ruth's Chris Steak House
Embassy Suites Buckhead
3285 Peachtree Road NE
Atlanta, GA 30305
Kathy Lamb

Kathy Lamb
IT Business Partner
Honeywell
Biography

In 1983, the idea of hacking into a computer system was science fiction, but today it is a terrifying – almost daily – reality. Almost 500 security breaches have been reported during 2014 alone, several of which have been high-profile, significant incidents compromising the private data of millions of people, costing millions of dollars, consuming excessive amounts of time to remediate and in some cases destroying careers. From malware to Heartbleed to outdated security practices, malicious hackers wait to exploit your smallest vulnerability – who will be next? Join our conversation to dive deep into the mega breach, discuss what it could mean for your company and learn how making security a priority at every level can protect you from becoming the next victim.

ISE® Northeast Executive Forum and Awards 2014

ISE Awards

The ISE® Northeast Executive Forum and Awards 2014 were held on October 9, 2014 at the Westin Times Square in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® NORTHEAST PRIVATE WELCOME DINNER
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

October 8, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Joe Bernik

Joe Bernik
Director
Promontory Financial
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER
The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

October 2, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
103 Summit Blvd
Birmingham, AL 35243

Dave Summitt
Chief Information Security Officer
UAB Health System
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

October 1, 2014
5:30pm - 8:30pm
The Palm Restaurant
Westin Buckhead Hotel
3391 Peachtree Rd NE
Atlanta, GA 30326
Tim Callahan

Tim Callahan
Chief Information Security Officer
Aflac Incorporated
ISE® Northeast People's Choice Award Winner 2009, ISE® North America Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2007, ISE® Southeast People's Choice Award Winner 2006, ISE® Southeast Executive Award Finalist 2006
Biography
T.E.N. Success Story

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER
Real-time Answers; Real-time Action: Your Solution to Better Incident Response

September 24, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church Street
Nashville, TN 37219
Registration
Paul Connelly

Paul Connelly
Vice President and Chief Information Security Officer
Hospital Corporation of America (HCA)
ISE® North America Executive Award Winner 2009
Biography

Modern malware and advanced persistent threats are capable of exfiltrating massive amounts of data in minutes and moving silently throughout an enterprise environment. Attacks will compromise sensitive information, cause business critical system outages and cost organizations a substantial amount of time and money if incident response teams cannot take corrective action swiftly. The challenge is most organizations lack a true “real-time” view of the enterprise with visibility into unmanaged assets as well corporate as devices that are both on and off your network. Additionally, relying on information that is days or even weeks old makes it impossible to find the answers you need to take immediate action. Join our conversation to discuss how instant access to complete, real-time data can transform your incident response strategy by enabling your team to ask questions, get immediate, current and real-time answers and take instant action to remediate while the incident is still occurring.

ISE® PRIVATE DINNER: Virtualization and the Cloud - Security as an Enabler

September 23, 2014
5:30pm - 8:30pm
The Capital Grille
2502 E Camelback
Phoenix, AZ 85016
Rich Mason

Rich Mason
Vice President & Chief Security Officer
Honeywell International
Biography

Interest in private and hybrid cloud adoption is surging because clouds offer large operational and financial benefits. By sharing application, computer, and network resources in a virtualized environment, business units and cloud service providers can boost IT speed and efficiency, business agility, resource utilization, and profitability. Although there are no questions about the benefits, there is significant debate about the potential risk regarding protection of key assets and data, admin access, multitenancy risk, visibility loss, and compliance. Join our conversation to discuss the role of security as enabler in both public and private cloud adoption, and learn best practices for mitigating risk and effectively addressing the new security challenges created by virtualized environments.

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

September 23, 2014
5:30pm - 8:30pm
Ruth’s Chris Steak House
920 2nd Ave Suite 100
Minneapolis, MN 55402
Joe Dufresne

Joe Dufresne
Data Privacy Officer
Allianz Life
Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

September 18, 2014
5:30pm - 8:30pm
The Oceanaire Seafood Room
5061 Westheimer Rd.
Houston, TX 77056
Patrick Sullivan

Patrick Sullivan
Chief Information Security Officer
GE Oil & Gas
Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER
Securing Your Data Across Channels: Strategies for Outpacing Zero Day Threats and Sophisticated Hackers

September 17, 2014
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center
Dunwoody, GA 30346

Pete Chronis
Chief Security Officer
EarthLink
Atlanta, GA
Biography

Mobile, social, and cloud technologies enable an organization’s efficiency and productivity, and can often provide competitive and brand differentiation. However, the widespread adoption of these services often results in an environment where free flowing data quickly outpaces an organization’s ability to proactively defend against imminent and emerging security threats. Join our conversation to explore best practices for multi-channel data breach prevention and implementation of real-time, unified security and data theft defenses to outpace Zero Day threats and sophisticated hackers.

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

September 16, 2014
5:30pm - 8:30pm
Coach Insignia
100 Renaissance Center - Floor 72
Detroit, MI 48243
Eric Litt

Eric Litt
Chief Information Officer - OnStar
General Motors
ISE® Central People’s Choice Award Winner 2006
ISE®/CSI North America Members' Choice Award Winner 2006
ISE® North America Executive Award Finalist 2006
ISE® Central Executive Award Finalist 2006

Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

September 4, 2014
5:30pm - 8:30pm
Ruth’s Chris Steak House
1601 Van Ness Avenue
San Francisco, CA 94109
Rich Jackson

Rich Jackson
Senior Advisor to the CIO for Cyber Security
Chevron Corporation
ISE® Luminary Leadership Award Winner 2011
ISE® North America Executive Award Finalist 2006

Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® VIP Reception and CISO Panel Discussion
CISO INVESTMENT AGENDA: LET’S DREAM BIG

August 28, 2014
6:45 pm – 7:45 pm
City Club of Buckhead
Atlanta, GA

Despite organizations best efforts to improve their overall security posture, threats are emerging and evolving at an alarming rate. Security teams are struggling to stay ahead of today’s threats while anticipating tomorrow’s as well. Effective information security programs are built on a foundation that includes people, processes and technology. They also depend on the buy-in and support of executive level management. Without the necessary capital that only management can provide, the security program is useless. Considerations need to be made in determining the appropriate level of funding required, and where to allocate it. This discussion will examine and prioritize the technologies, infrastructure needs, personnel issues and security initiatives that should make up a CISO’s ideal investment agenda.

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

August 26, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Ramesh Sepehrrad

Ramesh Sepehrrad
VP of National Governance, Risk and Compliance
Comcast
Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER
Governance, Compliance & Collaboration: Succeeding in a Complex Market

August 14, 2014
5:30pm - 8:30pm
The Chicago Chop House
60 W. Ontario St.
Chicago, IL 60654
Yabing Wang

Yabing Wang
Chief Security Architect, Enterprise Technology & Architecture Services
Allstate Insurance Company
Biography

The compliance and technology landscape has changed dramatically since 2008 for systematically important financial institutions (SIFIs). Regulators are increasing scrutiny and fines (SEC OCIE and FRB BS&R) and internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. From simple document sharing to surveillance and monitoring, corporations struggle to maintain efficiency without compromising security and control. Join us for a discussion with your peers to address the biggest challenges your organization is facing. We’ll address these challenges and discuss best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.

ISE® PRIVATE DINNER
Governance, Compliance & Collaboration: Succeeding in a Complex Market

August 12, 2014
5:30pm - 8:30pm
The Capital Grille
201 North Tryon Street
Charlotte, NC 28202

Gideon Rasmussen
Risk Control Officer
Bank of America
Biography

The compliance and technology landscape has changed dramatically since 2008 for systematically important financial institutions (SIFIs). Regulators are increasing scrutiny and fines (SEC OCIE and FRB BS&R) and internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. From simple document sharing to surveillance and monitoring, corporations struggle to maintain efficiency without compromising security and control. Join us for a discussion with your peers to address the biggest challenges your organization is facing. We’ll address these challenges and discuss best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.

ISE® VIP RECEPTION: Creating a Security Organization that is Adaptable to Change

August 7, 2014
7pm - 10pm
The Cosmopolitan of Las Vegas
Chandelier Room
3708 Las Vegas Blvd. South
Las Vegas, NV 89109
Details

Join our ISE® Alumni Hosts for this engaging reception and networking opportunity as we address the best methods to structure the various aspects of security within your organization — especially in times of change.

The ISE® Lions' Den and Jungle Lounge

August 6, 2014
3:00 pm - 6:30 pm
Vdara Hotel & Spa at Aria Las Vegas
Details

This summer TEN of security’s hottest emerging security companies have the courage to enter… The ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. Inside the den, each Gazelle will deliver their best pitch for the chance to earn the top award of more than 10,000 in prizes. Running concurrently, the Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with a diverse group of security executives, investors and other key members of the information security community.

ISE® West Executive Forum and Awards 2014

The ISE® West Executive Forum and Awards 2014 will be held on July 30, 2014 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® West Private Welcome Dinner:
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

July 29, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St
San Francisco, CA 94102
Matthew Archibald

Matthew Archibald
Vice President, Information Security
Silver Spring Networks
ISE® West Award Executive Finalist 2010
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: Aligning Vulnerability and Privilege Management in the Context of Business Risk

July 22, 2014
5:30pm - 8:30pm
Morton’s Steakhouse
3400 W Olive Ave
Burbank, CA 91505
Bernie Cowens

Bernie Cowens
Vice President & Chief Information Security Officer
First American
Biography

Despite gigantic investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts of data. CISOs need new strategies for assessing, prioritizing and addressing both internal and external risks in business context. Join our conversation to discuss how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

ISE® PRIVATE DINNER: Aligning Vulnerability and Privilege Management in the Context of Business Risk

July 17, 2014
5:30pm - 8:30pm
Del Frisco’s Grille
2425 E Camelback Rd St 110
Phoenix, AZ 85016
Vaughn Hazen

Vaughn Hazen
Director IT Security, CISO
Freeport-McMoRan Copper & Gold
Biography

Despite gigantic investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts of data. CISOs need new strategies for assessing, prioritizing and addressing both internal and external risks in business context. Join our conversation to discuss how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

ISE® PRIVATE DINNER: Virtualization and the Cloud - Security as an Enabler

July 17, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steakhouse
Located near the Galleria on the Tollway
5251 Spring Valley Road
Dallas, TX 75254
John R. South

John R. South
Chief Security Officer
Heartland Payment Systems
ISE® Central Executive Award Winner 2011
ISE® of the Decade Central Award Winner 2012
ISE® North America Executive Award Finalist 2011

Biography
T.E.N. Success Story

Interest in private and hybrid cloud adoption is surging because clouds offer large operational and financial benefits. By sharing application, computer, and network resources in a virtualized environment, business units and cloud service providers can boost IT speed and efficiency, business agility, resource utilization, and profitability. Although there are no questions about the benefits, there is significant debate about the potential risk regarding protection of key assets and data, admin access, multitenancy risk, visibility loss, and compliance. Join our conversation to discuss the role of security as enabler in both public and private cloud adoption, and learn best practices for mitigating risk and effectively addressing the new security challenges created by virtualized environments.

ISE® PRIVATE DINNER: Virtualization and the Cloud - Security as an Enabler

July 15, 2014
5:30pm - 8:30pm
Morton’s
4 Avenue Rd
Toronto, ON M5R 2E8
Greg Thompson

Greg Thompson
Vice President, Information Security
ScotiaBank
Biography

Interest in private and hybrid cloud adoption is surging because clouds offer large operational and financial benefits. By sharing application, computer, and network resources in a virtualized environment, business units and cloud service providers can boost IT speed and efficiency, business agility, resource utilization, and profitability. Although there are no questions about the benefits, there is significant debate about the potential risk regarding protection of key assets and data, admin access, multitenancy risk, visibility loss, and compliance. Join our conversation to discuss the role of security as enabler in both public and private cloud adoption, and learn best practices for mitigating risk and effectively addressing the new security challenges created by virtualized environments.

WEB CONFERENCE: Avoid Fines & Make Sales
What you need to know about Canadian Anti-Spam Legislation (CASL)


July 15, 2014
2pm - 3pm EST
Adam Kardash

Adam Kardash
Partner
Osler, Hoskin & Harcourt LLP
Biography

Della Shea

Della Shea
Chief Privacy and Information Risk Officer
Symcor, Inc.
ISE® Canada Executive Award Winner 2013
Biography

On July 1, 2014, Canada is shutting the door on unsolicited commercial electronic messages with new anti-spam legislation that will affect you. Stringent standards with very few exemptions will require implied or direct consent and violations could cost your company millions. Join our discussion to learn from our legal expert more about the risks you will take with outbound marketing programs, and hear first hand from one of Canada’s leading security executives why face-to-face networking events have become the most effective way to form the relationships that lead to sales.

ISE® PRIVATE DINNER: Aligning Vulnerability and Privilege Management in the Context of Business Risk

June 25, 2014
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Neil Storey

Neil Storey
Sr. Business Leader - Global Information Security
VISA

Despite gigantic investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts of data. CISOs need new strategies for assessing, prioritizing and addressing both internal and external risks in business context. Join our conversation to discuss how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

ISE® PRIVATE DINNER
The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

June 18, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
4725 Piedmont Row Dr. #170
Charlotte, NC 28210
Scott Frost

Scott Frost
Chief Information Security Officer
Belk
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

June 17, 2014
5:30pm - 8:30pm
The Capital Grille
444 Brickell Ave
Miami, FL 33131
John Christly

John Christly
Chief Information Security Officer, Executive Director, HIPAA Security Officer
Nova Southeastern University
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Virtualization and the Cloud - Security as an Enabler

June 17, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Vas Rajan

Vas Rajan
Managing Director & Chief Information Security Officer
CLS Bank International
Biography

Interest in private and hybrid cloud adoption is surging because clouds offer large operational and financial benefits. By sharing application, computer, and network resources in a virtualized environment, business units and cloud service providers can boost IT speed and efficiency, business agility, resource utilization, and profitability. Although there are no questions about the benefits, there is significant debate about the potential risk regarding protection of key assets and data, admin access, multitenancy risk, visibility loss, and compliance. Join our conversation to discuss the role of security as enabler in both public and private cloud adoption, and learn best practices for mitigating risk and effectively addressing the new security challenges created by virtualized environments.

ISE® Central Executive Forum and Awards 2014

The ISE® Central Executive Forum and Awards 2014 was held on June 11, 2014 at the Sheraton Hotel in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Central Private Welcome Dinner:
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

June 10, 2014
5:30pm - 8:30pm
Dallas Chop House
1717 Main Street
Dallas, TX 75201
Brian Wrozek

Brian Wrozek
Chief Security Officer
Alliance Data Systems
ISE® Central Executive Award Winner 2008
Biography
T.E.N. Success Story

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

June 3, 2014
5:30pm - 8:30pm
Del Frisco’s Grille
3376 Peachtree Rd
Atlanta, GA 30326
name

Michelle Stewart
Senior Director of IT Security and Governance
The American Cancer Society
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

VIRTUAL TRAINING: Your Guide Through the SWAMP: Avoiding Predators in a Murky World

May 22, 2014
2-3 p.m. EST
Miron Livny, Ph.D.

Miron Livny, Ph.D.
Director and Chief Technology Officer
Software Assurance Marketplace
Biography

Arthur Hicken

Arthur Hicken
Evangelist
Parasoft Corporation
Biography

Software has become an essential component of our nation’s critical infrastructure, growing in size, capability and complexity at a rate that exceeds our ability to keep pace with assuring its quality. As development teams quickly generate new code to meet their organization’s demands, individuals and groups with malicious intent lurk, waiting for the opportunity to exploit software vulnerabilities, which disrupt business continuity, compromise assets and create significant financial burdens. The Software Assurance Marketplace enables developers to build in solid assurance and security practices early and throughout the SDLC, dramatically reducing vulnerabilities and risk. Join us to tour the SWAMP and learn how to gain free and unfettered access to the capabilities necessary to effectively identify and resolve software defects and ultimately build a stronger software assurance program. Knowledgebase Event Listing

SWAMP is funded by Department of Homeland Security, Science and Technology Directorate, Cyber Security Division (CSD)

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 21, 2014
5:30pm - 8:30pm
Seven Steakhouse
700 Hennepin Avenue
Minneapolis, MN 55403
Steven Jensen

Steven Jensen
VP and Chief Information Security Officer
Ameriprise Financial
ISE® North America Commercial Executive Award Finalist 2013
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 20, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
1426-28 Chestnut Street
Philadelphia, PA 19102
Todd Bearman

Todd Bearman
Chief Information Security Officer
Tower Watson
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Securing the Supply Chain: Challenges and Best Practices for Mitigating Third-Party Risk,

May 15, 2014
5:30pm - 8:30pm
Hy’s Steakhouse
Toronto, ON
Chris Wysopal

Chris Wysopal
Co-Founder and Chief Technology Officer
Veracode
Biography

When sources revealed that the infamous Target breach was a result of supply chain vulnerabilities, the impact was felt industry wide, leaving many asking an important question — who takes responsibility for the security of third-party vendors? New PCI Data Security Standards hold businesses and organizations accountable, but vast and rapidly expanding web perimeters create immense challenges for a CISO, who must manage the maze of web assets and third-party solutions with fixed resources and funding. Join our conversation to discuss the biggest challenges and best practices for mitigating third-party risk and learn how to build an effective program to secure your entire application infrastructure.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 13, 2014
5:30pm - 8:30pm
Morton’s the Steakhouse
Denver, CO
Larry Brock

Larry Brock
Former Chief Information Security Officer
DuPont
ISE® Luminary Leadership Award Winner 2009
ISE® North America Commercial Executive Award Finalist 2008

Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Risky Business – Why DLP Should be Fundamental to Your Security Strategy

May 13, 2014
5:30pm - 8:30pm
The Chicago Chop House
Chicago, IL

David Gochenaur
Director of Global Information Security
AON

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 1, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
210 E. Trade St.
Charlotte, NC 28202

Prentis Brooks
Director, Information Security
Time Warner Cable
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER
The Information Security Iceberg: Demonstrating the True Value of Data Privacy and Security

April 29, 2014
5:30pm - 8:30pm
Absinthe Brasserie & Bar
398 Hayes St at Gough
San Francisco, CA 94102

Jonathan Rosenoer
Senior Vice President, Head of Operational Risk
Bank of the West

Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders, but have we fully uncovered the true value of data privacy and security — or is this the tip of the iceberg? Join us for a candid discussion with your peers as we analyze the legal ramifications and punitive damages of data and security breaches, calculate the impact of cyber risk from a liability and cost perspective and explore real-world challenges in protecting information.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

April 22, 2014
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center West
Dunwoody, GA 30346
Joe Bennett

Joe Bennett
CISO
YP
Tucker, GA
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER: The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

April 10, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church Street
Nashville, TN 37219
Bill Dieringer

Bill Dieringer
Former AVP, CISO
Ardent Health Services
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® PRIVATE DINNER: Governance, Compliance & Collaboration: Succeeding in a Complex Market

April 8, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
name

Robert Mazzocchi
Vice President and CISO
AIG
Biography

The compliance and technology landscape has changed dramatically since 2008 for systematically important financial institutions (SIFIs). Regulators are increasing scrutiny and fines (SEC OCIE and FRB BS&R) and internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. From simple document sharing to surveillance and monitoring, corporations struggle to maintain efficiency without compromising security and control. Join us for a discussion with your peers to address the biggest challenges your organization is facing. We’ll address these challenges and discuss best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.

ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?

April 3, 2014
5:30pm - 8:30pm
Ruth’s Chris Steak House
920 2nd Avenue South
Minneapolis, MN 55014
Shelbi Rombout

Shelbi Rombout
Cybersecurity Partnership Executive
U.S. Bank
Biography

Although the NSA leaks by Edward Snowden will likely be remembered as one of the most significant breaches in history, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an “inside-out” model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

April 2, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
1426-28 Chestnut Street
Philadelphia, PA 19102
Cathy Beech

Cathy Beech
Chief Information Security Officer
Children's Hospital of Philadelphia
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?

March 27, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
25 East Ohio Street
Chicago, IL 60611
Jason Witty

Jason Witty
Senior Vice President,
Chief Information Security Officer
U.S. Bancorp
Naperville, IL
ISE® Central People's Choice Award Winner 2014
ISE® North America People's Choice Award Winner 2014

Biography

The continuously unfolding story of the Edward Snowden leaks is becoming one of the most significant events in U.S. history. Although this situation is extreme, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an "inside-out" model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

March 26, 2014
5:30pm - 8:30pm
Eddie Merlot’s
455 S 4th Street
Louisville, KY 40202
Carl Alexander

Carl Alexander
Information Security Professional
UPS
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

March 25, 2014
5:30pm - 8:30pm
Sullivan’s Steakhouse
621 Union Street
Seattle, WA 98101
Brett Durfee

Brett Durfee
Manager for Security Operations and Disaster Recovery
PACCAR

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

March 19, 2014
5:30pm - 8:30pm
Chamberlain’s Fish Market Grill
4525 Belt Line Road
Addison, TX 75001
Chris Ray

Chris Ray
Chief Information Security Officer
Epsilon
ISE® Southeast Executive Award Winner 2011
Biography
T.E.N. Success Story

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?

March 13, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
1426-28 Chestnut Street
Philadelphia, PA 19102
John Kelly

John Kelly
Vice President, National Security Operations
Comcast
Biography

The continuously unfolding story of the Edward Snowden leaks is becoming one of the most significant events in U.S. history. Although this situation is extreme, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an "inside-out" model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.

ISE® Southeast Executive Forum and Awards 2014

The ISE® Southeast Executive Forum and Awards 2014 will be held on March 11, 2014 at the Westin Buckhead Hotel in Atlanta, GA. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER: Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

March 10, 2014
5:30pm - 8:30pm
The Palm Restaurant
Westin Buckhead Hotel
3391 Peachtree Road
Atlanta, GA 30326
Wait List Request
Robert Mims

Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
ISE® Southeast People's Choice Award Winner 2014
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?

March 6, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
551 5th Ave
New York, NY 10017
Donna Nemecek

Donna Nemecek
VP, Manager Technology Risk Assurance & Senior Information Risk Officer
BNY Mellon
ISE® Northeast Executive Award Finalist 2013
Biography

The continuously unfolding story of the Edward Snowden leaks is becoming one of the most significant events in U.S. history. Although this situation is extreme, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an "inside-out" model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.

ISE® PRIVATE DINNER: Speed & Security – Why CISOs Want an Agile SDLC

March 4, 2014
5:30pm - 8:30pm
Denver ChopHouse & Brewery
1735 19th Street
Denver, CO 80202
Trent Fox

Trent Fox
Technology Risk Management
Kaiser Permanente IT
Biography

Regardless of industry, size or purpose, more companies and organizations rely on the World Wide Web for transactions and customer engagement than ever before. However, conducting business online requires a fast-paced development process and high demand for services allows minimal downtime for updates and patching. Security must be built into the SDLC from the beginning. Join our conversation to examine why CISOs and their teams are shifting to a more agile development process and discuss why embedding security early and throughout the SDLC can prevent severe, costly consequences down the road.

ISE® VIP Programs at RSA 2014

Once again, T.E.N. via the ISE® VIP Programs will proudly be at the RSA® Conference 2014 with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference 2014.

ISE® VIP Programs include a special breakfast, luminary luncheons, and exclusive VIP receptions in evenings. As our ISE® VIP Programs have been oversubscribed in previous years due to limited availability, we recommend that you register for these programs early. Details

Tenable Executive Retreat Napa 2014

Tenable's top customers are invited for a weekend in beautiful Napa Valley where they will interact leading industry experts, and policy makers to discuss key security issues. In a relaxed setting, we will follow an organized agenda focused on moving beyond discussions of 'information sharing' in order to strengthen the security industry as a whole. Speakers and panelists will engage with 50 Tenable customer CSOs to discuss how government, enterprises, their boards of directors, executive management and technologists are responding, where there are successes, and where help is needed. Details

ISE® PRIVATE DINNER: Advancing Mobile Security to the Next Level

February 18, 2014
5:30pm - 8:30pm
Del Frisco's Grille
3376 Peachtree Road NE
Atlanta, GA 30326
Laz Lazarikos

Laz Lazarikos
IT Security Strategist and Former CISO
Sears Online Business Unit
Biography

In this fast-paced world, mobility is no longer optional; it is an essential component of business. Mobile applications drive productivity, but technology advancements and functionality improvements — often using sensitive information — bring new threats and increased vulnerability. The many hot button topics of mobile security have been discussed in industry circles for years, but the evolving threat landscape calls for security teams to dive deeper and be proactive in order to protect their mobile assets. Join this conversation to examine publicly known mobile security events, discuss emerging trends, and learn strategies that will advance your mobile security efforts to the next level.

ISE® PRIVATE DINNER: Speed & Security – Why CISOs Want an Agile SDLC

February 12, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
3925 Paradise Road
Las Vegas, NV 89169
Bill Worthington

William Worthington
Director of Security Operations & Engineering
Caesars Entertainment
Las Vegas, NV
ISE® West Executive Award Finalist 2014
Biography

Regardless of industry, size or purpose, more companies and organizations rely on the World Wide Web for transactions and customer engagement than ever before. However, conducting business online requires a fast-paced development process and high demand for services allows minimal downtime for updates and patching. Security must be built into the SDLC from the beginning. Join our conversation to examine why CISOs and their teams are shifting to a more agile development process and discuss why embedding security early and throughout the SDLC can prevent severe, costly consequences down the road.

ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?

February 5, 2014
5:30pm - 8:30pm
The Capital Grille
201 North Tryon Street
Charlotte, NC 28202
Tom Van Beek

Tom Van Beek
SVP, Vendor Security Strategy, Global Information Security
Bank of America

The continuously unfolding story of the Edward Snowden leaks is becoming one of the most significant events in U.S. history. Although this situation is extreme, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an "inside-out" model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.

ISE® PRIVATE DINNER: Secrets to Achieving End-to-End Email Security

January 30, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Mark Risoldi

Mark Risoldi
Managing Director
JP Morgan Chase & Co.
Biography

Securing your infrastructure is essential in protecting your customers, but malicious attacks can affect users without even entering your network. The Anti-Phishing Working Group reported 72,758 phishing attacks targeting more than 700 institutions worldwide during the first half of 2013 alone. As Verizon's Data Breach Report shows, 95% of all data breaches begin with a phishing email — evidence that comprehensive ecosystem visibility, email intelligence, and real-time alerting and reporting are imperative to thwarting these attacks. Join our conversation to take a deep dive into advanced email security methodology and learn best practices to achieving end-to-end email security in order to protect your customers and enable business. Download Presentation

VIRTUAL MEETING: Good Security Starts with Software Assurance

January 23, 2014
2-3 p.m. EST
Phil Agcaoili

Phil Agcaoili
VP, Chief Information Security Officer
Elavon, Inc.
ISE® Central Executive Award Winner 2009
ISE® of the Decade Southeast Award Winner 2012

Biography

Patrick Beyer, Ph.D. PMP

Patrick Beyer, Ph.D. PMP
Software Project Manager
Morgridge Institute for Research
Biography

name

Barton Miller, Ph.D.
Chief Scientist
Software Assurance Marketplace
Biography

Although there are innumerable benefits to living and working in a digitally connected world, there is great risk associated with vulnerabilities in the software on which we so heavily rely. Solid software assurance practices, such as building security early in the SDLC, can reduce risk, but many developers lack the tools necessary to fully employ these practices. Join this conversation to further examine the role of software assurance within the enterprise, learn which vulnerabilities are the most critical to mitigate, and discover how the Software Assurance Marketplace can provide free and unfettered access to the capabilities necessary to effectively identify and resolve software defects and ultimately build a stronger software assurance program. Watch Presentation Knowledgebase Event Listing

This event is sponsored by the Department of Homeland Security, Science & Technology, Cyber Security Division.

VIRTUAL MEETING: Shaping Your Approach - The Executive's Role in Software Assurance

January 22, 2014
2-3 p.m. EST
Jerry L. Davis

Jerry L. Davis
Chief Information Officer
NASA Ames Research Center
ISE® North America Government Executive Award Winner 2009
Biography

Kevin E. Greene

Kevin E. Greene
Software Assurance Program Manager
Department of Homeland Security, Science & Technology, Cyber Security Division
Biography

Miron Livny, Ph.D.

Miron Livny, Ph.D.
Director and Chief Technology Officer
Software Assurance Marketplace
Biography

Solid software assurance practices have become imperative to risk management. Although 100% secure code may be impossible to achieve, it is important that your development team has the tools and strategies necessary to identify and mitigate critical vulnerabilities before your applications are compromised. Strong software assurance and vulnerability management policies are best defined at the C-level in order to ensure high standards are implemented across all development projects. Join this conversation to take a closer look at the executive’s role in software assurance and learn how the Software Assurance Marketplace can shape your approach to building, implementing and sustaining an effective program that consistently produces and deploys resilient software. Watch Presentation Knowledgebase Event Listing

This event is sponsored by the Department of Homeland Security, Science & Technology, Cyber Security Division.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

January 22, 2014
5:30pm - 8:30pm
Ruth's Chris Steak House
700 W 47th St #115
Kansas City, MO 64112
Don Kleoppel

Don Kleoppel
Chief Information Security Officer
DST Systems
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.