ISE® PRIVATE DINNER
Securing the Supply Chain
John Martin
Program Manager, COTS Software Security
The Boeing Company
Biography
Shifts in technology have enabled global productivity and collaboration, but also have erased the network perimeter, motivating malicious attackers to refocus their sights on a new attack vector. IT supply chains, which often rely on disparate hardware and software suppliers from around the world, are becoming an increasingly tempting target. As a number of recent breaches have shown, the risks of compromise via third-party vectors are a serious issue and merit a firm commitment to due diligence of supply chain partners. Join our conversation to learn how you can implement a structured, policy-based approach to securing the supply chain and better assessing the security of third-party applications.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Prentis Brooks
Director, Cyber Security
Time Warner Cable
Biography
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks
5:30pm - 8:30pm
The Palm Restaurant, Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Kevin Morrison
Associate Director of Information Security
Jones Day
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
Chris Camacho
SVP Global Information Security
Bank of America
Biography
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
Linda Dawson
IT SCCE Incident and Investigation Manager
3M Company
Biography
Renee Peterson
Portfolio Manager, Information Security, Risk & Compliance Center
3M Company
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks
Linda Cooper Angles
Sr. Director, Information Security Risk Management
Thomson Reuters
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
1426-28 Chestnut St
Philadelphia, PA 19102
Myrna Soto
Corporate SVP and Global CISO
Comcast Corporation
Biography
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
Securing the Supply Chain
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, OH 43215
David Todd
Chief Information Security Officer
State Auto Insurance
Biography
Shifts in technology have enabled global productivity and collaboration, but also have erased the network perimeter, motivating malicious attackers to refocus their sights on a new attack vector. IT supply chains, which often rely on disparate hardware and software suppliers from around the world, are becoming an increasingly tempting target. As a number of recent breaches have shown, the risks of compromise via third-party vectors are a serious issue and merit a firm commitment to due diligence of supply chain partners. Join our conversation to learn how you can implement a structured, policy-based approach to securing the supply chain and better assessing the security of third-party applications.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Scott Breece
Vice President of Security, Chief Information Security Officer
Community Health Systems, Inc.
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® North America Leadership Summit and Awards 2015
The ISE® North America Leadership Summit and Awards will be held November 10-11, 2015 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® NORTH AMERICA PRIVATE DINNER
Effectiveness of Information Protection Technologies to Drive Operational Security Efficiency
Kevin Novak
CISO and IT Risk Officer
Northern Trust
The reality of today’s threat landscape is that no single product or service can solve every problem. The principals of multi-layered security architecture, integrating people, processes and technology is more important today, than it has ever been in the past. As organizations strive to find the right balance while under the pressure of shifting budgetary control, there is a light at the end of the tunnel. By adopting best practices, developing operational processes, and fine tuning those procedures, you can drive increases in your operational security model. Join our conversation to discover how to reduce ongoing expenditures by enabling the successful adoption of InfoSec controls, operated by educated staff and integrated into your organizations operational processes.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
250 Northern Ave
Boston, MA 02210
Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 -
Academic/Public Sector Category
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Cybersecurity in the Era of Cloud: Best Practices To Secure Data In the Cloud
Phil Agcaoili
Chief Information Security Officer
Elavon
Biography
Cloud applications like Salesforce, Google Apps, Box and Office 365 are becoming the preferred model of application delivery. With critical data now in the cloud, how do you balance the business needs of collaboration and productivity while keeping sensitive data safe? What new risks and threats should be considered to avoid making the headlines? How do you build in-house cloud security competency, and extend security and governance to cloud applications? Join our conversation to explore best practices of how to gain visibility, governance and protection of cloud applications, and how new tools/technologies like cloud access security brokers can help.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
Rajat Sen
Director of Information Security
Republic Services
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
The State of Cybersecurity: Rethink your Endpoint Security Strategy
Jack Key
Chief Information Security Officer
Brinks
Biography
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
788 W. Sam Houston Parkway North
Houston, TX 77024
Sanjeev Sah
Chief Information Security Officer
Texas Children’s Hospital
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks
Brad Maiorino
Chief Information Security Officer
Target Corporation
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
Know Thy Enemy: Using Intruder Analytics to Detect Compromise
5:30pm - 8:30pm
McCormick and Schmick’s Seafood & Steaks
301 Fifth Ave
Pittsburgh, PA 15222
When disaster strikes, time is of the essence. What’s the first thing you would do in the event of a breach? If your network has been compromised, your team must act quickly and efficiently to detect the compromise and respond before serious damage is done. Think minutes – not hours. Join this conversation to learn about how intruder analytics can help accelerate investigation and containment by identifying hard to detect attacker movements, phishing attacks and more, and instantly link actions to the users and assets impacted. We’ll also talk about how we can better prepare for an incident and respond effectivity if an incident occurs.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
Rich Baich
Chief Information Security Officer
Wells Fargo & Company
Biography
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISSA International Conference: Pathways to Empowered Security Leadership
10:00 am-10:45 am
Chicago Marriott Downtown Magnificent Mile
540 North Michigan Ave
Room: Northwestern/Ohio State
Chicago, IL 60611
Track: Business Skills for the Information Security Professional
Detailed Agenda
More Details
Marci McCarthy
CEO & President
T.E.N.
Biography
Panelists include:
Todd Fitzgerald, Global Director Information Security, Grant Thornton International, Ltd.
Richard Rushing, CISO, Motorola
Larry Lidz, CISO, CNA Insurance
Jeff Reich, Chief Security Officer, Barricade.io
The evolving security leader can seamlessly blend technical knowledge with business acumen to serve as a trusted partner to the board and the business…but no one starts at the top. During this invaluable panel discussion, top CISOs and information security leaders will share personal stories about when and where their careers began, what pivotal events launched them into leadership, and what has empowered them to grow stronger in the field. Security professionals at any level of experience will benefit from hearing the advice, knowledge and personal challenges these leaders have faced on their pathways to empowered security leadership.
ISE® Northeast Private Welcome Dinner
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management
Jay Wright
Information Security Officer
Citigroup Inc.
Biography
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
ISE® Northeast Executive Forum and Awards 2015
The ISE® Northeast Executive Forum and Awards 2015 will be held on October 8, 2015 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security
Dimitra Kane
Enterprise Architecture Sr. Manager
Discover Financial Services
Biography
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, OH 43215
Chris McFarland
Information Security Officer
Abercrombie & Fitch
Biography
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs. If you are interested in attending, please contact Deb Jones or Kate Parnell.
InfoSec Nashville: Pathways to Empowered Security Leadership
2:15 pm –3:05 pm
Music City Center
201 5th Avenue South
Room: #214
Nashville, TN 37203
More Details
Marci McCarthy
CEO & President
T.E.N.
Biography
Panelists include:
Kyle Duke, CIO, TENN Care
Bob Quandt, Exec Director of Security, Healthways
Scott Breece, CISO, CHS
Michael Mangold, Director of Security, Tractor Supply
The evolving security leader can seamlessly blend technical knowledge with business acumen to serve as a trusted partner to the board and the business…but no one starts at the top. During this invaluable panel discussion, top CISOs and information security leaders will share personal stories about when and where their careers began, what pivotal events launched them into leadership, and what has empowered them to grow stronger in the field. Security professionals at any level of experience will benefit from hearing the advice, knowledge and personal challenges these leaders have faced on their pathways to empowered security leadership.
ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security
Greg Schaffer
VP & Information Security Officer
FirstBank
Biography
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Cybersecurity in the Era of Cloud: Best Practices To Secure Data In the Cloud
Angel Mosley
Information Security Officer
Fiserv
Biography
Cloud applications like Salesforce, Google Apps, Box and Office 365 are becoming the preferred model of application delivery. With critical data now in the cloud, how do you balance the business needs of collaboration and productivity while keeping sensitive data safe? What new risks and threats should be considered to avoid making the headlines? How do you build in-house cloud security competency, and extend security and governance to cloud applications? Join our conversation to explore best practices of how to gain visibility, governance and protection of cloud applications, and how new tools/technologies like cloud access security brokers can help.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
September 23, 2015
5:30pm - 8:30pm
Trump International Hotel & Tower Toronto
Bay Street Room, 30th Floor
325 Bay Street
Toronto, ON M5H 4G3
Ray Archer
Senior VP and Chief Information Security Officer
Scotiabank
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Keeping the Crown Jewels Under Lock and Key: Protecting Your Enterprise from SAP Vulnerabilities
5:30pm - 8:30pm
Fleming's Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Tony Spurlin
Chief Information Security Officer
Cox Automotive
Biography
Virtually every SAP application is vulnerable to financial fraud, sabotage or espionage from cyber-attacks targeting these business-critical systems. They are the lifeblood of the world’s largest companies as they manage their most sensitive information and critical processes. Despite housing an organization’s “crown jewels,” SAP systems and their application layer are not protected by traditional security solutions. Join our conversation to learn more about the most critical SAP security vulnerabilities, public exploits and defense strategies.
ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks
Kannan Perumal
Chief Information Security Officer
Applied Materials
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security
5:30pm - 8:30pm
The Capital Grille
2502 E Camelback Rd, Suite 199
Phoenix, AZ 85016
Jim Huddleston
Director, Information Security and Compliance
PetSmart
Biography
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
The Cyber Defense Knowledge Exchange; Hunting Cyber Attacks
5:30pm - 8:30pm
Ruth’s Chris Steak House
920 2nd Avenue South
Minneapolis, MN 55402
Eng-Wee Ethan Yeo
Manager, Information Security Governance
Surescripts LLC
Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.
ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks
Dave Summitt
Director of Information Security
Moffitt Cancer Center
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
788 W. Sam Houston Parkway North
Houston, TX 77024
Russell Stalters
Director, Information & Data Management
BP
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security
David Hannigan
MVP, Security Engineering and Application Security
Capital One
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Scaling Security Across the Enterprise
Dennis Dickstein
Chief Privacy and Information Security Officer
UBS Wealth Management Americas
Biography
Application security threats continue to evolve at a rapid pace. At the same time, the size of the standard enterprise has also grown, extending beyond traditional borders and storage methods, leveraging different frameworks such as cloud, mobile, web and embedded devices. While this expansion allows for greater connectivity and the potential for further growth, it also opens up new avenues of attack. As the size and scope of the applications expand, your security application model and protocols must be scaled to ensure applications remain secure and protected against potential threats. Join our conversation to learn how you can proactively build security into the earliest stages of your software development lifecycle, enhance your application security program and scale security across your organization and to third party companies.
ISE® PRIVATE DINNER
Applying Threat Intelligence to Enhance Cyber Security
David Billeter
Vice President, Global Security, Privacy and Regulatory Compliance
Staples
Biography
Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.
ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Data on and off the Network
Bruce Coffing
Senior Vice President - Global Information Security
Bank of America
A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.
ISE® PRIVATE DINNER
Effectiveness of Information Protection Technologies to Drive Operational Security Efficiency
Michael Dierickx
Information Security Officer
Panasonic Avionics
Biography
The reality of today’s threat landscape is that no single product or service can solve every problem. The principals of multi-layered security architecture, integrating people, processes and technology is more important today, than it has ever been in the past. As organizations strive to find the right balance while under the pressure of shifting budgetary control, there is a light at the end of the tunnel. By adopting best practices, developing operational processes, and fine tuning those procedures, you can drive increases in your operational security model. Join our conversation to discover how to reduce ongoing expenditures by enabling the successful adoption of InfoSec controls, operated by educated staff and integrated into your organizations operational processes.
ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise
Matt Shufeldt
VP & CISO
Sports Authority
According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.
ISE® West Executive Forum and Awards 2015
The ISE® West Executive Forum and Awards 2015 will be held on August 20, 2015 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® WEST PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks
Jeff Trudeau
Information Security Officer
Sutter Health
ISE® West Project Award Winner 2013
ISE® North America Health Care Executive Award Winner 2013
ISE® Success Story
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security
Don Ainslie
Vice President, Security, Privacy and Risk
DST Systems
Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.
ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks
Joseph Lee
Chief Information Security Officer
Georgetown University
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Christopher Hudel
CISO
SPX Corporation
Biography
According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.
ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise
5:30pm - 8:30pm
Donovan’s Steak and Chop House
3101 East Camelback Road
Phoenix, Arizona 85016
Sean Azhadi
Vice President & Chief Technology Officer
Arizona State Savings & Credit Union
Biography
According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.
ISE® VIP RECEPTION
Cyber Defense Knowledge Exchange: Adopting an Adversarial Mindset
7:00pm - 10:00pm
The Cosmopolitan of Las Vegas
Chandelier Room
3708 Las Vegas Boulevard South
Las Vegas, NV 89109
Details
As security professionals, you don’t just collect intelligence—you analyze it, understand it, share it, and generate more. You use this intelligence to stay ahead in a rapidly changing cyberthreat landscape where you face persistent, unrelenting adversaries—both inside and outside your organizations. Intelligence drives your defense strategy and empowers your team to adopt an adversarial mindset to hunt down and eliminate cyber-attacks in real-time. Join our ISE® Alumni Hosts and program sponsors Cybereason and Lockheed Martin for an engaging reception and the opportunity to share your experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future. If you are interested in registering for this event, please contact Deb Jones.
The ISE® Lions' Den and Jungle Lounge
August 5, 20153:00 pm - 6:30 pm
Vdara Hotel & Spa at Aria Las Vegas
Details
This summer TEN of security’s hottest emerging security companies have the courage to enter… The ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. Inside the den, each Gazelle will deliver their best pitch for the chance to earn the top award of more than $30,000 in prizes. Running concurrently, the Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with a diverse group of security executives, investors and other key members of the information security community.
ISE® PRIVATE DINNER
Agile Security: Building A Faster, Stronger, More Responsive Model
5:30pm - 8:30pm
Bouchon Bistro at The Venetian Resort & Casino
3355 Las Vegas Boulevard South
Venezia Tower, 10th Floor
Las Vegas, NV 89109
David Cass
SVP & Chief Information Security Officer
Elsevier
ISE® Northeast People's Choice Award Winner 2013
Biography
Enterprises continue to invest heavily in virtual and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of cloud benefits, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to develop a more agile, efficient and effective security infrastructure to enable your enterprise to fully capitalize on the many benefits of Infrastructure-as-a-Service (IaaS). If you are interested in registering for this event, please contact Deb Jones and Katie Kroessig.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Franklin Donahoe
Chief Information Security Officer
Mylan
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Bill Boni
Vice President and Corporate Information Security Officer
T-Mobile USA
ISE® North America Commercial Executive Award Finalist 2007
ISE® Central Executive Award Winner 2007
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Modernize Your Enterprise: Orchestrating a Secure, Heterogeneous Network
Adam Maslow
Director, Security and Compliance
JCPenney
Networks have become progressively more complex and require constant transformation as new threats emerge. With network environments in a state of flux, security teams need to address continuing modernization and business operation’s needs, such as supporting applications teams, migrating data centers, troubleshooting connectivity problems and preparing for audits. In addition to that, many organizations have begun the process of implementing plans for IT transformation initiatives, including virtualization and cloud computing. Even for well-trained and seasoned security teams, adding these processes – in addition to the already time consuming efforts of network monitoring and information security – can become a daunting task. Join our conversation to learn how to modernize your enterprise through tight security posture, rapid service delivery and regulatory compliance across all platforms.
ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise - SOLD OUT
Carlos Batista
Group Vice President, Security Operations & Intelligence
SunTrust Banks
Biography
According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Julie Lucas
VP, IT Security
The Huntington National Bank
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER : The Evolving Challenge of Third Party Security Risk Management
E. Larry Lidz
Assistant Vice President, Information Security
CNA Insurance
Biography
Industry experts estimate that third-party security breaches are growing at an astounding rate, leading many to believe that a firm’s level of cybersecurity is only as good as the security of its vendors. To be successful, CISOs must work with, not against, partners to effectively remediate immediate threats and lower collective security risk. Join our conversation to discuss how to better protect your organization from third party threats by adding continuous monitoring to your arsenal and adopting practices for collaborative intervention and remediation.
ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security
Jerry Dixon
Vice President, Security Incident Response
American Express
Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.
SOFTWARE SECURITY ASSURANCE SUMMIT
2:00pm - 6:00pm
THE WESTIN SOUTH COAST PLAZA
686 Anton Boulevard
Costa Mesa, CA 92626
Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography
SOFTWARE SECURITY ASSURANCE SUMMIT
2:00pm - 6:00pm
SHERATON SUNNYVALE
1100 North Mathilda Avenue
Sunnyvale, CA 94089
Registration
Details
Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography
SOFTWARE SECURITY ASSURANCE SUMMIT
2:00pm - 6:00pm
THE WESTIN BUCKHEAD ATLANTA
3391 Peachtree Road NE
Atlanta, GA 30326
Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography
SOFTWARE SECURITY ASSURANCE SUMMIT
2:00pm - 6:00pm
THE WESTIN TIMES SQUARE
270 West 43rd Street
New York, NY 10036
Registration
Details
Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography
SOFTWARE SECURITY ASSURANCE SUMMIT
2:00pm - 6:00pm
SHERATON CENTRE TORONTO HOTEL
123 QUEEN STREET WEST
TORONTO, ON M5H 2M5
Details
Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography
ISE® PRIVATE DINNER
Secrets to Securing the Dynamic, Complex Enterprise Environment
Cathy Rees
VP, Information Security
Comcast Corporation
Biography
As they grow and become more dynamic, enterprise environments become increasingly complex, making it difficult for businesses to understand and control the risks presented by their web-facing assets such as web applications, mobile applications and network infrastructure. Historically, this problem has been compounded by vulnerability discovery solutions that breed a culture of compliance and fail to accurately portray an adversary’s view of the environment. A new approach is needed to align actual and perceived risks to business operations, revenue, and reputation. Join our conversation to explore how continuous assessment, scalability, visibility and control are key to securing your complex enterprise network and ensuring success for your business.
SOFTWARE SECURITY ASSURANCE SUMMIT
2:00pm - 6:00pm
THE RITZ-CARLTON TYSONS CORNER
1700 Tysons Boulevard
McLean, VA 22102
Details
Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography
ISE® PRIVATE DINNER
Know Thy Enemy: Using Intruder Analytics to Detect Compromised Users
Jose Alvir
Senior Director
Pfizer, Inc.
Biography
Time is not an abundant resource when an intruder is in your network, yet speed is a necessity when identifying and addressing incidents involving compromised users. Your team must be able to quickly and efficiently detect incidents, investigate their credibility and respond immediately to disrupt the attack before damage is done. Think minutes – not hours – as response time is one of the most substantial factors that will influence the impact and loss caused by a breach. The use of intruder analytics and can arm your team with knowledge of attacks and intruder behavior to more rapidly identify malicious actors and initiate mitigation. Join our conversation to learn more about incorporating intruder analytics into your cyber security program and discover best practices for detecting and addressing compromised user based attacks.
ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security
Carla Donev
Director, IT Risk Management
Cardinal Health, Inc.
Biography
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Jason Lish
Vice President of Security Technology & Operations
Charles Schwab & Company
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks
Brian Klement
Former Managing Director of Information Security
NYSE Euronext
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® Central Executive Forum and Awards 2015
The ISE® Central Executive Forum and Awards 2015 will be held on May 7, 2015 at the Sheraton Downtown in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® CENTRAL PRIVATE WELCOME DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks
Ajay Gupta
Chief Information Security Officer
Concentra
Biography
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
ISE® PRIVATE DINNER
Governance, Compliance & Collaboration: Succeeding in a Complex Market
5:30pm - 8:30pm
Trump International Hotel & Tower Toronto
Bay Street Room, 30th Floor
325 Bay Street
Toronto, ON M5H 4G3
Michael Bentley
IT Risk Management Director
Royal Bank of Canada
Biography
The compliance and technology landscape has changed dramatically since 2008 for systematically important financial institutions (SIFIs). Regulators are increasing scrutiny and fines (SEC OCIE and FRB BS&R) and internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. From simple document sharing to surveillance and monitoring, corporations struggle to maintain efficiency without compromising security and control. Join us for a discussion with your peers to address the biggest challenges your organization is facing. We’ll address these challenges and discuss best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.
ISE® PRIVATE DINNER
Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information
Evelyn Briggs
VP Global IT Compliance
AIG
Biography
Mike Coogan
Chief Information Security Officer
Waste Management
Houston, TX
Biography
In today’s threat landscape, the high frequency of unauthorized intrusions drive an ever-increasing need to maintain security, access and control of mission-critical information. From simple sharing of proprietary documents to surveillance and monitoring, corporations struggle to maintain efficiency without creating unnecessary risk. The need to collaborate securely across international boundaries creates additional challenges for your business. Join us for a conversation with your peers to address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment.
ISE® VIP Programs at RSA 2015
Once again, T.E.N. via the ISE® VIP Programs will proudly be at the RSA® Conference 2015 with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference 2015.
ISE® VIP Programs include a special breakfast, luminary luncheons, and exclusive VIP receptions in evenings. As our ISE® VIP Programs have been oversubscribed in previous years due to limited availability, we recommend that you register for these programs early. Details
Tenable Executive Retreat Napa 2015
Tenable's top customers are invited for a weekend in beautiful Napa Valley where they will interact with leading industry and policy experts to discuss key security issues. In a relaxed setting, we will follow an organized agenda focused on moving beyond discussions of 'information sharing' in order to strengthen the security industry as a whole.
As we enter 2015, one of the great and vexing ironies is that as IT infrastructure has taken center stage in both business and government, IT has also ‘left the building’, dispersed to locations mobile, virtual, social, and cloud, operated by third parties – as if protecting it wasn’t already difficult enough.
Speakers and panelists will engage with 50 Tenable customer CSOs to discuss how government, enterprises, their boards of directors, executive management and technologists are responding, where there are successes, and where help is needed.
ISE® PRIVATE DINNER: The Cyber Defense Knowledge Exchange
Dr. Yonesy F. Nuñez
SVP, Information Security Leader - International
Wells Fargo
Biography
Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.
ISE® PRIVATE DINNER:
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management
Julie Talbot-Hubbard
Assistant Vice President Information Technology Engineering
Nationwide Mutual Insurance Company
ISE® Central Executive Award Winner 2010
T.E.N. Success Story
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe
ISE® PRIVATE DINNER: The Cyber Defense Knowledge Exchange
6:30pm - 9:00pm
Omni Riverfront Hotel New Orleans
Rex Room, 1st Floor
701 Convention Center Blvd
New Orleans, LA 70130
Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
ISE® Southeast People's Choice Award Winner 2014
Biography
This event is being hosted in conjunction with the AGA Conference, therefore participation is limited to security executives and professionals in the gas/energy/utilities industries. Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.
ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security
Dave Estlick
VP, Technology Infrastructure & Enterprise Security
Starbucks Coffee Company
Biography
There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Don’t Be the Next Victim: Strategies for Preventing and Mitigating Advanced Threats
William Worthington
Chief Information Security Officer
Caesars Entertainment
Las Vegas, NV
ISE® West Executive Award Finalist 2014
Biography
DDoS attacks continue to increase in frequency and evolve in sophistication and complexity, often making national news and wreaking havoc on the enterprise. Victims claim DDoS attacks cause an estimated $27 million in damages for a 24-hour outage along with interrupted business operations, lost revenue, customer defection and damage to the brand. In order to successfully protect the enterprise, your security strategy must involve preventative and defensive measures that rely on access to comprehensive, accurate and current malware data and continuous visibility across your network. Join our conversation to discuss your existing approach to preventing and mitigating advanced threats and learn new strategies for ensuring your enterprise does not become the next victim.
ISE® PRIVATE DINNER: The Cyber Defense Knowledge Exchange
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
5061 Westheimer Rd Suite 8060
Houston, TX 77056
Rich Jackson
Retired Senior Advisor to the CIO for Cyber Security
Chevron Corporation
ISE® Luminary Leadership Award Winner 2011
ISE® North America Executive Award Finalist 2006
Biography
Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
ISE® Northeast Executive Award Finalist 2014
ISE® North America Executive Award Winner 2014 - Health Care Category
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Bracing for Impact: Cyber Security Legislation and Collaboration
Joseph Kinslow
Group Information Security Officer (GISO), SVP, Retail Services Cards Business
Citigroup Inc.
Biography
In his recent State of the Union address, President Obama urged Congress to finally pass legislation needed to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children’s information. In the weeks leading up to this address, the president rolled out several initiatives, including to establish a national standard for companies to inform consumers of a data breach within 30 days of discovery. He also released an updated proposal to improve information-sharing across industry and government around cyber threats. When passed into law, these new changes could have a substantial impact on corporate collaboration, compliance and reporting – how are you readying your organization for the impact? Join our conversation to take a deep dive into the potential cyber security legislation and learn how your peers are preparing for the potential changes the new requirements may bring.
ISE® Southeast Executive Forum and Awards 2015
The ISE® Southeast Executive Forum and Awards 2015 will be held on March 4, 2015 at the Westin Buckhead Hotel in Atlanta, GA. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® PRIVATE DINNER
Don’t Be the Next Victim: Strategies for Preventing and Mitigating Advanced Threats
John Graham
Chief Information Security Officer
Jabil
ISE® Southeast Executive Award Finalist 2012
Biography
DDoS attacks continue to increase in frequency and evolve in sophistication and complexity, often making national news and wreaking havoc on the enterprise. Victims claim DDoS attacks cause an estimated $27 million in damages for a 24-hour outage along with interrupted business operations, lost revenue, customer defection and damage to the brand. In order to successfully protect the enterprise, your security strategy must involve preventative and defensive measures that rely on access to comprehensive, accurate and current malware data and continuous visibility across your network. Join our conversation to discuss your existing approach to preventing and mitigating advanced threats and learn new strategies for ensuring your enterprise does not become the next victim.
ISE® PRIVATE DINNER
Don’t Be the Next Victim: Strategies for Preventing and Mitigating Advanced Threats
Todd Fitzgerald
Global Director of Information Security
Grant Thornton International, Ltd
2005 ISE® Central Finalist
2006 ISE® Central MC & Judge
2008 ISE® West MC
2012 ISE® North America MC
Security Author
Biography
DDoS attacks continue to increase in frequency and evolve in sophistication and complexity, often making national news and wreaking havoc on the enterprise. Victims claim DDoS attacks cause an estimated $27 million in damages for a 24-hour outage along with interrupted business operations, lost revenue, customer defection and damage to the brand. In order to successfully protect the enterprise, your security strategy must involve preventative and defensive measures that rely on access to comprehensive, accurate and current malware data and continuous visibility across your network. Join our conversation to discuss your existing approach to preventing and mitigating advanced threats and learn new strategies for ensuring your enterprise does not become the next victim.
ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management
5:30pm - 8:30pm
The Palm Restaurant,Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Michael Wilcox
Director of Global IT Security
Newell Rubbermaid
Biography
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
ISE® PRIVATE DINNER
Mitigating Insider Threats: Safeguard Data While Enabling Business
Stacey Halota
Vice President, Information Security and Privacy
Graham Holdings
ISE® Mid-Atlantic Commercial Executive Award Winner 2009
Biography
Recent reports indicate that insider threats have outpaced all others as the leading cause of mega breaches. In addition to innocuous employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management solutions alone ineffective as a security measure. How can you ensure employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.