ISE® PRIVATE DINNER
There’s a Service for That – Enhancing your Security with Data Loss Prevention Services
Ken Patterson
CISO
Harvard Pilgrim Health Care
Biography
Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. For many organizations, protecting their trade secrets and intellectual property means implementing a data loss prevention (DLP) program that allows them to encrypt information, track when it leaves the company firewall, and alert information-technology managers when users attempt to violate policy. Without data Loss prevention technology and tactics embedded at the core of their company’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join our conversation to learn why DLP should be fundamental to your security strategy and learn how you can achieve enterprise-wide threat visibility across your environment and benefit from big data analytics and integrated threat intelligence services.
ISE® PRIVATE DINNER
Cyberattacks on the Rise: How The Oil & Gas Industry Are Combatting Security Threats
5:30pm - 8:30pm
Pappas Bros. Steakhouse Downtown
Houston Center
1200 McKinney St
Houston, TX 77010
Larry Brock
Retired CISO/ ISE® Industry Expert
Dupont/T.E.N.
Biography
Cyber threats and attacks against the oil & gas industry have shown no sign of slowing down as threats become increasingly complex and sophisticated. Cybersecurity threats have rapidly escalated since 2008, when the industry fell victim to nation-state attacks and resulted in the theft of bid-lease data, seismic markups and intellectual property. Now, with the exploitation of new cost-effective use of digital technologies and increased dependence on cyber structures, the oil and gas industry is exposed to increased losses primarily stemming from the activities of malicious, compromised and/or careless internal users. As most oil & gas facilities are now connected to the Internet in some capacity, protecting vital digital infrastructure against cyber-attacks is crucial in ensuring safe operations and optimal production regularity. Join the conversation with your peers to learn more about some of the major threats facing the industry and how to protect your sensitive data against insider threats and industrial espionage.
ISE® PRIVATE DINNER
There’s a Service for That – Enhancing your Security with Data Loss Prevention Services
Kannan Perumal
Chief Information Security Officer
Applied Materials, Inc.
Biography
Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. For many organizations, protecting their trade secrets and intellectual property means implementing a data loss prevention (DLP) program that allows them to encrypt information, track when it leaves the company firewall, and alert information-technology managers when users attempt to violate policy. Without data Loss prevention technology and tactics embedded at the core of their company’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join our conversation to learn why DLP should be fundamental to your security strategy and learn how you can achieve enterprise-wide threat visibility across your environment and benefit from big data analytics and integrated threat intelligence services.
ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses against Malware and Ransomware
5:30pm - 8:30pm
Eddie V’s Prime Seafood and Steak
4400 W Boy Scout Blvd
Tampa, FL 33607
Dave Summitt
Chief Information Security Officer
Moffitt Cancer Center
Biography
While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.
The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques.
ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Information in Motion
Julie Talbot-Hubbard
SVP, Head of Information Security Operations
SunTrust Banks, Inc.
Biography
A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.
ISE® PRIVATE DINNER
The Digital Communication Conundrum
Craig Shumard
Principal
Shumard Associates
Biography
ISE® Tri-State Award Winner 2005
ISE® Luminary Leadership Award Recipient 2010
Email was never designed to be a secure medium, yet we use it every day in corporate communications. As you well know, it has become the bane of our existence. Growth in digital business transactions, rising regulation demands and increased security threats has reinvigorated demand for adaptable email encryption. Confidential financial statements, medical records, travel itineraries and investment information are regularly sent unencrypted. To maintain trust and demonstrate a commitment to safeguarding customers' demands for privacy, organizations are under increasing pressure to find game-changing digital solutions. Join our conversation as we delve into the link between encryption, revenue growth, and customer trust.
ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses against Malware and Ransomware
Ashley Ewing
CISO
The University of Alabama
Biography
While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.
The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques.
ISE® North America Leadership Summit and Awards 2016
The ISE® North America Leadership Summit and Awards was held November 9-10, 2016 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® NORTH AMERICA PRIVATE WELCOME DINNER & ELECTION VIEWING PARTY
Orchestrating a Move Away From the Silos
Brenda Callaway
Executive Director, Information Security
Health Care Service Corporation- Blue Cross and Blue Shield of Illinois
Biography
“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.
Additionally, as our dinner will be held on Election Day, ServiceNow and T.E.N. will be hosting a special viewing party immediately following the dinner to view the election results. This after-party will also be held at David Burke’s Primehouse in their private library room, which will feature televisions, couches, desserts, and after-dinner drinks. Join your fellow InfoSec Executives after an evening of engaging collaboration and discussions to relax and view the election results!
ISE® PRIVATE DINNER
Information Security Iceberg: Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information
Michael Dierickx
Director Security Engineering/Information Security Officer
Panasonic Avionics
Biography
A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. The need to collaborate securely across international boundaries creates additional challenges for your business. Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders. Are we truly safeguarding against data privacy and data security — or are these breaches the tip of the iceberg?
Join us for a candid discussion with your peers as we calculate the impact of information security from a risk and cost perspective and explore real-world challenges in protecting information. We will address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment
ISE® PRIVATE DINNER
Protecting your Assets at Risk - Keeping your Assets out of Harm’s Way
Steve Zalewski
Chief Security Architect
Levi Strauss
Biography
Many of today’s enterprises approach cyber security from a technology point-of-view. They purchase point solutions which end up operating in siloes, never intersecting. Yet as the business environment becomes even more complex, threat actors become more sophisticated, and more sensitive data needs protection, enterprises must shift their tactics to effectively keep their assets safe. They must adopt a risk-based approach to cyber security which means bringing together threats, vulnerabilities, the value of the assets at risk and other business context to determine where their greatest risk lies and how to reduce it. They must also make security everybody’s business – from security teams to line-of-business application owners that govern valued assets to boards of directors – enabling all parties to do their part in proactively reducing risk. Join our conversation and learn how to develop a risk based cyber security program to better identify, communicate and reduce the risk of your most valued assets from getting breached.
ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos
Marc Stefaniu
Director - Information Security Governance, Risk and Compliance
TMX Group Inc.
“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.
ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 E Trade St, Epicentre
Charlotte, NC 28202
Hafid Elabdellaoui
Managing Director- IT Security & Compliance
Duke Energy
Biography
Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.
ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program
5:30pm - 8:30pm
Edge Steak & Bar
Four Seasons Hotel Miami
1435 Brickell Ave
Miami, FL 33131
Ana Roldan
AVP, Chief Information Security Officer
Miami Dade College
Biography
Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.
ISE® Northeast Executive Forum and Awards 2016
The ISE® Northeast Executive Forum and Awards 2016 will be held on October 4, 2016 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® NORTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It
David Ritenour
Managing Director, CISO
Blackrock Inc.
Biography
Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.
ISE® PRIVATE DINNER
Protecting your Assets at Risk - Keeping your Assets out of Harm’s Way
Gary Toretti
VP & Chief Information Security Officer
Sabre Corporation
Biography
Many of today’s enterprises approach cyber security from a technology point-of-view. They purchase point solutions which end up operating in siloes, never intersecting. Yet as the business environment becomes even more complex, threat actors become more sophisticated, and more sensitive data needs protection, enterprises must shift their tactics to effectively keep their assets safe. They must adopt a risk-based approach to cyber security which means bringing together threats, vulnerabilities, the value of the assets at risk and other business context to determine where their greatest risk lies and how to reduce it. They must also make security everybody’s business – from security teams to line-of-business application owners that govern valued assets to boards of directors – enabling all parties to do their part in proactively reducing risk. Join our conversation and learn how to develop a risk based cyber security program to better identify, communicate and reduce the risk of your most valued assets from getting breached.
ISE® PRIVATE DINNER
Preventing a Data Hostage Situation: Developing a Ransomware Preparedness Plan
5:30pm - 8:30pm
The Palm
Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Bob Varnadoe
Chief Information Security Officer
NCR Corporation
Biography
Ransomware has rapidly emerged as a significant threat to businesses and organizations of all verticals and sizes. In this day and age where data is invaluable, cybercriminals are taking advantage of people who don’t know a lot about malware behavior. Unfortunately, there is no silver bullet when it comes to ransomware. Being prepared to deal with it requires a multilayered, step-by-step approach for the best risk mitigation Join our conversation to learn how you can best protect your organization from ransomware and avoid business disruption, loss of productivity, damage to brand reputation and legal implications that come along with recovering from a ransomware attack.
ISE® PRIVATE DINNER
The Information Security Iceberg: Demonstrating the True Value of Data Privacy and Security
Craig Shumard
Retired CISO, CIGNA
ISE® Industry Expert, T.E.N.
ISE® Luminary Leadership Award Recipient 2010
Biography
Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders, but have we fully uncovered the true value of data privacy and security — or is this the tip of the iceberg? Join us for a candid discussion with your peers as we analyze the legal ramifications and punitive damages of data and security breaches, calculate the impact of cyber risk from a liability and cost perspective and explore real-world challenges in protecting information.
ISE® PRIVATE DINNER
Security on the Move: Keeping Mobile Threats at Bay
David Dang
SVP/CIO
Primeway FCU
Biography
Unique to this dinner, guests will have the pleasure of enjoying fine wines paired with the most delicious meals. We will periodically break up the conversation when each wine is brought out for tasting with an appropriately-paired, dinner course. Each pairing will be described and discussed as you partake in them, providing plenty of time to enjoy the combination flavors before we resume discussion.
As smartphones and tablets become more powerful, securing devices and data is critical for enterprise mobility stakeholders. For instance, more than half of all decision makers in a recent IDC survey experienced security and compliance issues during mobility rollouts. With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need security that integrates with existing systems for continuous protection. Join our conversation to learn how your organization can better defend against mobile attacks and why comprehensive mobile security is required to keep devices and data safe.
ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration
Vincent Campitelli
Retired VP IT Risk Management/ ISE Industry Expert
McKesson Corporation
Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach
Ennis Alvarez
VP of IT Infrastructure
Rooms To Go
Biography
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
InfoSec Nashville: What Keeps You Up at Night? Potential InfoSec Challenges for CISOs in the Coming Future
2:15 pm –3:05 pm
Music City Center
201 5th Avenue South
Nashville, TN 37203
More Details
Marci McCarthy
CEO & President
T.E.N.
Biography
Panelists include:
Jennifer Cole, VP Information Security & Governance, ServiceMaster
Joseph Johnson, CISO, Premise Health
William Crank, CISO, MEDHOST
The Information Security industry started out working with technology as simple as antivirus software and firewalls that succeeded in thwarting adversary attacks. But within the past 10-15 years, the industry has evolved rapidly. Today we must deal with advanced concepts such as the Internet of Things; biometrics; APTs; threat intelligence; and more that require innovative strategies to combat—antivirus and firewalls are no longer enough. Threats to the industry are diligent, and as a result we ask ourselves: where is this leading the industry? What technology must we look for? What must we do to stay on the cutting edge?
ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses Against Malware and Ransomware
Michael Mangold
Vice President, IT Security & BCP/DR
Tractor Supply Company
Biography
While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.
The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques. Our dinner will be hosted the evening before the 2016 InfoSec Nashville Conference, so kick off your conference experience by joining us for engaging discussions over dinner.
ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence
Helen Patton
Chief Information Security Officer
The Ohio State University
Biography
Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.
ISE® PRIVATE DINNER
Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information
Nicholas Shevelyov
Chief Security & Privacy Officer
Silicon Valley Bank
Biography
In today’s threat landscape, the high frequency of unauthorized intrusions drive an ever-increasing need to maintain security, access and control of mission-critical information. From simple sharing of proprietary documents to surveillance and monitoring, corporations struggle to maintain efficiency without creating unnecessary risk. The need to collaborate securely across international boundaries creates additional challenges for your business. Join us for a conversation with your peers to address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment.
ISE® PRIVATE DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It
Deborah Wheeler
Chief Information Security Officer
Freddie Mac
Biography
Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.
ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos
Sean Murphy
VP, CISO
Premera Blue Cross
Biography
“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.
ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Douglas Crawford
Vice President Network Services
Warner Bros. Entertainment Inc.
Biography
“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.
ISE® PRIVATE DINNER
IT Hygiene– What’s Your Source of Truth? And How Much Do You Trust It?
Ken Athanasiou
VP, Chief Information Security Officer
AutoNation
Biography
Good IT hygiene is essential for good security in every organization but is being consistently overlooked by Enterprises. What’s the point of worrying about Zero-Days and APTs if you can't answer with confidence what systems are on your network, what's running in your environment or whether your systems are patched? It's time to do the basics, better.
Join our conversation to discuss how security hygiene and having shared visibility by both IT Operations and Security can more effectively allow an organization to detect, investigate, remediate and build good security hygiene into ongoing IT operations processes. We’ll discuss how innovative technologies can improve cyber resilience and enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.
ISE® PRIVATE DINNER
Stay Out of Breach Headlines: Protect your critical Web applications and sensitive customer data against cyber-attacks
Christofer Hoff
SVP, Cyber Security Technology
Bank of America Merrill Lynch
Biography
Your financial institution is a high-value target for cyber criminals. According to the 2016 Verizon Data Breach Report, financial services is the most breached industry, accounting for 35% of breaches last year. Cyber-attackers are after the sensitive data your institution collects – customer personally identifiable information (PII) and account data. As today’s cyber-attacks become increasingly sophisticated with criminals exploiting users and web applications to steal data, it is imperative to develop a multi-layered security strategy.
Join your peers for a discussion over dinner on how they are protecting what matters most –customer PII, account and financial data and the applications that access that data.
ISE® PRIVATE DINNER
Mobile & IoT Applications: Discovering the Missing Security Link
5:30pm - 8:30pm
The Palm - Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Phil Agcaoili
Chief Information Security Officer
Elavon
Biography
Today’s mobile and IoT software applications are entrusted to securely transfer funds, manage people’s healthcare, and perform other critical functions without fail. A number of major organizations are also starting to invest more in IoT applications and R & D development for future IoT related projects. However, 97% of applications lack adequate binary protections, leaving mobile and IoT applications vulnerable to data compromise, IP theft, and manipulation. Join our conversation to learn more about the kinds of risks presented by IoT applications and what some companies are doing to prepare for a new threat vector.
WOMEN IN CYBER TECHNOLOGY
5:30pm - 7:30pm
L'alliance Française
Colony Square, 1197 Peachtree St NE #561
Atlanta, GA 30361
Marci McCarthy
CEO & President
T.E.N.
Biography
Women make up just under half of the US workforce overall. Yet only about 10% of the cyber security workforce is female even though there is currently a significant shortage of skilled cyber technology professionals. The Netherlands American Chamber of Commerce is privileged to have a panel of outstanding women from the private and government cyber technology arenas. Our experts will share with you their own experiences about overcoming challenges and forging successful careers in this critically important and growing field. Join us on Monday August 22nd to discuss why women are underrepresented in the cyber world and what we can do to change this.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach
Carl Alexander
Information Security Manager
United Parcel Service, Inc.
Biography
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration
5:30pm - 8:30pm
The Capital Grille- Tyson’s Corner
1861 International Dr.
McLean, VA 22102
Jerry Archer
Chief Security Officer & SVP
Sallie Mae
Biography
Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.
ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration
Jeffrey Dimuro
Chief Security Architect
Salesforce
Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.
ISE® VIP RECEPTION
Returning Power to the Defender
7:00pm - 10:00pm
The Cosmopolitan of Las Vegas
Chandelier Room
3708 Las Vegas Boulevard South
Las Vegas, NV 89109
Details
Advanced attacks have become everyone’s problem. Cyber criminals continue to stay on the cutting edge of attack methodologies and have sharply increased their capabilities and techniques, targeting major companies across all industries. Enterprises can no longer wait and react to the next big attack. In order to maintain a top of the line defense against the newest threats to cybersecurity, organizations across all vectors must adopt a more vigilant and agile approach to security in order to combat the new era of threats they now face. We invite you to join Cybereason and Lockheed Martin for an engaging discussion and networking opportunities on how organizations can regain control and transform into elite defenders.
The ISE® Lions' Den & Jungle Lounge
August 3, 2016
Vdara Hotel & Spa at Aria Las Vegas
Details
This summer TEN of security’s hottest emerging security companies have the courage to enter… The ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. Inside the den, each Gazelle will deliver their best pitch for the chance to earn the top award of more than $25,000 in prizes. Running concurrently, the Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with a diverse group of security executives, investors and other key members of the information security community.
ISE® PRIVATE DINNER
Future Is Agile: Securing Servers In Modern Datacenter, Private Cloud And Public Cloud
Tony Spurlin
Chief Information Security Officer
EarthLink
This ISE® Private Dinner is the evening before the ISE® Lions’ Den and Jungle Lounge as well as coincides with the security conferences that are taking place throughout the week in Las Vegas
The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This change has been challenging as many traditional security approaches don’t translate well into cloud computing models. Security and compliance teams are learning that force fitting old tools can result in gaps in coverage, repeated manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of a dynamic infrastructure.
ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Registration
Rich Jackson
Former Senior Advisor to the CIO for Cyber Security
Chevron Corporation
ISE® Luminary Leadership Award
Winner 2011
Biography
Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach
5:30pm - 8:30pm
The Palm - Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Ben Murphy
Director of Security Operations and Threat Management
Aflac
Biography
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration
Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography
Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.
ISE® West Executive Forum and Awards 2016
The ISE® West Executive Forum and Awards 2016 will be held on July 21, 2016 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions.
ISE® WEST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It
Selim Aissi
Chief Information Security Officer
Ellie Mae
Biography
Al Ghous
Director, Cyber Security
GE Digital
Biography
Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.
ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Information in Motion
James Morris
Global Information Security Officer Global Functions
Citigroup Inc.
A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.
ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Governance and Security Management
Steven Jensen
Executive VP and Chief Information Security Officer
Scottrade
ISE® North America Commercial Executive Award Finalist 2013
Biography
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s attackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of users, especially those with elevated access rights. Access governance has tried to reduce the access footprint, but has largely become a compliance rubber-stamping exercise. Closing the gap requires a new approach. Applying security context and user access behavior into your identity and access governance efforts are imperative to reducing the vulnerability presented by our weakest link - users. Join our conversation for a deep dive into identity, access governance and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
ISE® PRIVATE DINNER
The Secure Data Solution
Clarke Rodgers
Chief Information Security Officer
Velogica - SCOR Global Life Americas
Biography
As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.
ISE® PRIVATE DINNER
The Secure Data Solution
Bill Boni
Vice President, Information Security
T-Mobile USA
Biography
As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.
ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence
Carlos Batista
Group Vice President, Security Operations & Intelligence
SunTrust Banks
Biography
Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.
ISE® PRIVATE DINNER
The Secure Data Solution
5:30pm - 8:30pm
Del Frisco’s Steakhouse
1426 Chestnut St Ste 28
Philadelphia, PA 19102
Ray Hawkins
Chief Information Security Officer
Genesis HealthCare Corporation
Biography
As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.
ISE® PRIVATE DINNER
Bridging the Communication Gap: Best Practices for Reporting to Your Board
Ed Yousfi
Director, Global Security & Risk Management
Walgreens Boots Alliance
Biography
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s attackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of users, especially those with elevated access rights. Access governance has tried to reduce the access footprint, but has largely become a compliance rubber-stamping exercise. Closing the gap requires a new approach. Applying security context and user access behavior into your identity and access governance efforts are imperative to reducing the vulnerability presented by our weakest link - users. Join our conversation for a deep dive into identity, access governance and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
ISE® PRIVATE DINNER
Have Your Cake and Eat It Too: Boost Agility and Security with Network Security Policy Orchestration
Larry Brock
ISE® Industry Expert
T.E.N.
ISE® Luminary Leadership Award Winner 2009
ISE® North America Commercial Executive Award Finalist 2008
Biography
Between the shortage of skilled IT security professionals and the rise in complexity and variety of devices and infrastructure, it is increasingly difficult for organizations to balance business agility with security policy. Security and operations teams are tasked with ensuring uptime and connectivity while supporting critical business initiatives in a timely manner. Furthermore, they are expected to protect the company from cyber threats by complying with internal policies and industry regulations. As applications span across not only physical networks, but also private and public cloud platforms, security policies and connectivity can no longer be managed in silos, and communication gaps between operations and security teams must be bridged. IT needs to implement security changes in minutes, not days, and manage application uptime and connectivity that is infrastructure agnostic. Join our conversation to learn how you can use network security policy orchestration to gain visibility and control across physical networks and hybrid cloud platforms, and tighten security practices to ensure continuous compliance.
ISE® PRIVATE DINNER
Keeping the Keys to the Kingdom out of the Hands of the Enemy
Bob Quandt
VP, Information Security
Healthways, Inc.
Biography
New threats target the trust provided by keys and certificates, and allow bad guys to look legitimate so they can surveil networks, stay undetected, steal data, and bypass other security systems. For example, attacks using SSL/TLS to circumvent critical controls are steadily increasing. Gartner expects that by 2017, more than 50% of network attacks will use encrypted SSL/TLS. The ability to quickly decrypt and inspect SSL traffic in real time and detect threats is, therefore, imperative. Join our conversation to learn how your organization can better prepare and mitigate potential damage from SSL/TLS abuse through improved visibility and tighter control of key and certificate inventories at an enterprise-wide level.
ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program
Chris Ray
ISE Industry Expert
T.E.N.
Biography
Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach
William McCaster
2nd VP, Information Security & Risk Officer
Ohio National Financial Services
David Brown
IT Security Manager
Ohio National Financial Services
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Data on and off the Network
5:30pm - 8:30pm
Hy’s Steakhouse Toronto
101-120 Adelaide Street West
Toronto, ON M5H 1T1
Chris Ray
ISE® Industry Expert
T.E.N.
Biography
A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.
ISE® PRIVATE DINNER
Fighting Cybersecurity Adversaries despite the Global Staffing Shortage: Exploring the Role of Automation in Detection and Response
Steve Adegbite
Chief Information Security Officer
eTrade
Biography
While some claim that the state of cyber security has reached full-blown systemic failure, the growing realization that we live in a post-breach world is driving new approaches that promise a brighter future in the fight against cyber-security adversaries. Join the discussion to learn about finding the right mix of human talent and innovative technologies to overcome the security talent shortage and defeat advanced threats that may already be inside your organization.
ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program
Mike Towers
VP, Executive Information Security Officer
Allergan
Biography
Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach
Yasir Pervaiz
Sr. Manager of Application Security
U.S. Bank
Biography
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach
Drake Cody
Executive Director, Information Security
Target
Biography
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program
Darren Challey
VP Enterprise Information Security
Expedia, Inc.
Biography
Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.
ISE® PRIVATE DINNER
The Secure Data Solution
Max Solonski
Chief Security Officer
Blackline
Biography
As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.
ISE® Central Executive Forum and Awards 2016
The ISE® Central Executive Forum and Awards 2016 will be held on May 3, 2016 in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® CENTRAL PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It
Betty Elliot
VP, CISO
Moneygram
Biography
Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.
ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos
5:30pm - 8:30pm
The Palm - Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Brad Sanford
Chief Information Security Officer
Emory University
Biography
“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.
ISE® PRIVATE DINNER
Combatting the Insider Threat – Protecting Your Organization at its Core
Myrna Soto
Corporate SVP and Global CISO
Comcast Corporation
Biography
Cybersecurity is a human-centric issue. Insiders within an organization hold the keys to the crown jewels and just one misstep – whether unintentional or malicious – can put those keys in the wrong hands. Moreover, insider threats have the potential to boom into bigger more devastating problems like data exfiltration, extortion, full scale data breaches, and compliance violations. In thinking about how to address these risks, organizations need to take a balanced approach and also think about how to protect their business from every angle (on premise, in the cloud, at the endpoints, etc).
Join our conversation as we discuss how your security team can help be better prepared for potential insider threats through stricter access controls, tighter privileged user options, and data loss prevention – all delivered through a cohesive set of well–integrated applications that each address a different aspect of the insider threat problem.
ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos
Jennifer Cole
CISO & VP Information Security and Governance
ServiceMaster
Biography
“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.
ISE® PRIVATE DINNER
Bringing the Malware Threat to Zero
5:30pm - 8:30pm
Truluck’s
777 Brickell Ave.
Miami, FL 33131
(At 8th Street and Brickell in the SunTrust Building)
Will Perez
IT Director, Security, Compliance & Governance
Royal Caribbean Cruises
Biography
While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. More malware was found in the past two years than in the previous 10 years combined. Malware complexity is increasing as cybercriminals refine their intrusion techniques, masking malware signatures and varying attack methods. Zero-day attacks in particular have continued to grow as newer malware are finding ways to bypass traditional security measures. Join our conversation to learn how you can protect your organization’s network and systems against malware attacks via threat extraction, CPU-level inspection, and sandboxing techniques.
ISE® PRIVATE DINNER
Think Like a User, Protect Like a Pro: Applying User Behavior Analytics to Data Loss Prevention
Chris Hymes
Director of Information Security
Riot Games
Biography
Early detection of modern cyber-attacks continues to grow in importance. The earlier an organization can detect an attack, the less of a detrimental impact that attack is likely to cause. To that end, User Behavior Analytics (UBA) is one of the fastest-growing areas within enterprise security. Having spent billions on anti-malware, DLP, log management, and SIEM technologies, commercial and public organizations are finding that these investments are unable to detect modern attacks and provide limited efficiency gains within the SOC. Join our conversation to learn more about how the application of User Behavior Analytics can improve data loss prevention through better detection, incident prioritization, and breach forensics.
ISE® PRIVATE DINNER
Fighting Cybersecurity Adversaries despite the Global Staffing Shortage: Exploring the Role of Automation in Detection and Response
Bill Barouski
Deputy Chief Information Security Officer
Northern Trust Corporation
Biography
While some claim that the state of cyber security has reached full-blown systemic failure, the growing realization that we live in a post-breach world is driving new approaches that promise a brighter future in the fight against cyber-security adversaries. Join the discussion to learn about finding the right mix of human talent and innovative technologies to overcome the security talent shortage and defeat advanced threats that may already be inside your organization.
ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Governance and Security Management
Craig Froelich
Chief Information Security Officer
Bank of America
Biography
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s attackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of users, especially those with elevated access rights. Access governance has tried to reduce the access footprint, but has largely become a compliance rubber-stamping exercise. Closing the gap requires a new approach. Applying security context and user access behavior into your identity and access governance efforts are imperative to reducing the vulnerability presented by our weakest link - users. Join our conversation for a deep dive into identity, access governance and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From Breach
Tom Van Winkle
CISO/Vice President, Information Security
Alliance Data
Biography
Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.
Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.
ISE® PRIVATE DINNER
The Secure Data Solution
James Carpenter
Chief Information Security Officer/Chief Technology Officer
Texas Scottish Rite Hospital for Children
Biography
As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.
ISE® Southeast Executive Forum and Awards 2016
The ISE® Southeast Executive Forum and Awards 2016 will be held on March 15, 2016 at the Westin Peachtree Plaza, Downtown, in Atlanta, GA. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® SOUTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It
5:30pm - 8:30pm
Ruth’s Chris Steakhouse(Centennial Olympic Park)
267 Marietta St
Atlanta, GA 30313
Joshua Sorenson
Lead Security Advisor – Strategy
Delta Air Lines
Biography
Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.
ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence
5:30pm - 8:30pm
Capital Grille- Tyson’s Corner
1861 International Dr
McLean, VA 22102
Amanda Cody
VP of Information Security
National Geographic Partners
Biography
Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.
ISE® PRIVATE DINNER
Maximizing the Business Value of Safeguarding Sensitive Data
Arthur Lessard
SVP, Chief Information Security Officer
Universal Music Group
Biography
The evolution of data is forcing many organizations to reevaluate and refocus their information management practices to better integrate and leverage data in core business processes. Countless organizations have implemented Data Loss Prevention (DLP) tools, encryption and data classification to help address the risk of data loss; however, once the tools have been deployed, the real challenge often begins. An effective Data Protection solution/program should be approached holistically, focusing not just on the technology, but also upon the people and processes needed to support and interface with the system(s). Join the conversation to learn why building an effective program around Data Security is just as important as picking the right tools.
ISE® VIP Programs at RSA 2016
Once again, T.E.N. via the ISE® VIP Programs will proudly be at the RSA® Conference 2016 with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference 2016.
ISE® VIP Programs include a special breakfast, luminary luncheons, and exclusive VIP receptions in evenings. As our ISE® VIP Programs have been oversubscribed in previous years due to limited availability, we recommend that you register for these programs early. Details
ISE® VIP Signature Luncheon
Breach Anywhere is Breach Everywhere
11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Great Room
More Information
The top advanced threat solution providers acknowledge they cannot prevent or detect every attack. Use of stolen credentials is the #1 threat to web application security according to 2015 Verizon Data Breach report. Spilled credentials have fueled major website attacks against Uber, Fitbit, JPMC, and Toys”R”Us in 2015 alone. Targeted organizations can lose control of thousands of customer accounts and experience tens of millions of dollars in fraud losses. Over lunch, we’ll discuss the automation used by attackers to bypass web application firewalls and fraud control, and we’ll examine our options for securing online applications. Join us and we’ll decide for ourselves if the situation is truly hopeless.
T.E.N. & ISE® Sales and Marketing Breakfast
Sponsored by:
7:45 am - 10:00 am
The W Hotel
181 Third Street
San Francisco, CA 94103
Social Terrace
More Information
Learn From the Top CISO’s on What Influences Them to Respond To You
Your next customer doesn’t want to hear from you via an impersonal cold call, through a flashy email or unsolicited meeting notice. So how do you get your foot in the door for a meeting? What are the best strategies and secrets for ensuring you connect with the right people at the right times and in an ethical and timely manner? Find the answers by asking a CISO yourself at the T.E.N.’s ISE® Sales and Marketing Breakfast during the 2016 RSA® Conference. Our panel of executive thought leaders will share their real world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give an inside track to effectively marketing and selling solutions to the nation’s top IT and security executives.
ISE® VIP Signature Luncheon with Bay Dynamics
Bridging the Communication Gap: Best Practices for Reporting to Your Board
11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information
Security executives are increasingly required to report to CEOs and the board of directors about cybersecurity risk in the enterprise. It’s a golden opportunity for CISOs and CIROs to make security champions out of the most influential leaders in the organization. Unfortunately, it’s also an opportunity often missed by IT and security teams. Only 25 percent of board audit committees in the United States say the quality of cybersecurity information they receive is good. With most security reporting metrics being useless to their board, CISOs and CIROs need to prepare their reporting with the rigor of a CFO. If you feel like you're having a hard time getting through to your CEO and board of directors, it might be time to rethink your approach. We will discuss the metrics that the board wants, what information CISOs and CIROs often don’t have, and the critical ways you can improve how you communicate risk up the management chain. Hosted by our ISE® Alumni VIP Hosts please come and enjoy a stimulating lunch conversation!
ISE® VIP Reception
Guarding the Heart of the Enterprise through Strategic Data Protection
6:00 pm - 8:00 pm
St Regis Hotel
125 Third St.
San Francisco, CA 94103
Conservatory
More Information
The top advanced threat solution providers acknowledge they cannot prevent or detect every attack. Whether you have a next generation firewall on the network or a new EDR product at the endpoint, the bad guys are still getting in. So what are you supposed to do to ensure you don’t suffer a devastating breach? Investing in a well formed, holistic data protection program is a proven approach that stops the theft of sensitive data. Join us for this engaging reception during RSA® Conference 2016 to learn how you can improve your security posture through broader visibility and granular controls to ensure your enterprise’s most valuable asset – the data - is secure.
Symantec/ISE® VIP Signature Luncheon
12:00 pm – 2:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information
Join our distinguished ISE® Alumni Hosts and program sponsor Symantec for an engaging luncheon and conversation, and discover the many exciting changes that lie on the horizon as the company continues to evolve as a global leader in security solutions. This is an excellent opportunity to hear directly from Symantec’s President & CEO, Mike Brown, on the Security Operations of 2020. Join us to hear how Symantec will:
- Protect against tomorrow’s threats
- Keep your data safe as you move into the Cloud
- Lean on the world’s best experts
- Reduce your security risk
ISE® VIP Reception
Sponsored by:
Six of the Industry’s Hottest Security Companies!
7:00 pm - 10:00 pm
St Regis Hotel
125 Third St.
San Francisco, CA 94103
Terrace
More Information
Hosted by our ISE® Alumni VIP Hosts please come and enjoy the killer views of San Francisco from the rooftop terrace at the St. Regis – drink, eat and enjoy mixing and mingling with your peers while discussing some of the industry's hottest topics!
ISE® VIP Reception
Cyber Defense Knowledge Exchange: Adopting an Adversarial Mindset
5:30 pm – 7:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Upstairs Bar/Mixx
More Information
Hosted by our ISE® Alumni VIP Hosts please come and enjoy the killer views of San Francisco from the rooftop terrace at the St. Regis – drink, eat and enjoy mixing and mingling with your peers while discussing some of the industry's hottest topics!
ISE® VIP Welcome Reception
The Tastes of San Francisco Tour hosted by Bromium: Experience The City’s Diverse Cuisine
5:30 pm – 7:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Work Room 2-3
More Information
Fresh seafood, North Beach Italian, Asian Fusion, crepes and coffee… San Francisco is celebrated for its diverse cuisine, savory entrées and decadent desserts. Experience the many delectable dishes of the Bay Area without leaving the welcoming ambiance of the W Hotel. Take a culinary tour with program sponsor Bromium, ISE® Alumni Hosts and your peers in information security as you indulge in the many mouthwatering flavors of San Francisco.
ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence
Haddon Bennett
Chief Information Security Officer
Change Healthcare
Biography
Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.
ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business
Connie Barrera
Chief Information Security Officer
Jackson Health System
Biography
Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.
ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom
Sameer Sait
Vice President & Chief Information Security Officer
Arrow Electronics
Biography
With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.
ISE® PRIVATE DINNER
Think Like a User, Protect Like a Pro: Applying User Behavior Analytics to Data Loss Prevention
Mikhael Felker
Director, Information Security
The Honest Company
Biography
Early detection of modern cyber-attacks continues to grow in importance. The earlier an organization can detect an attack, the less of a detrimental impact that attack is likely to cause. To that end, User Behavior Analytics (UBA) is one of the fastest-growing areas within enterprise security. Having spent billions on anti-malware, DLP, log management, and SIEM technologies, commercial and public organizations are finding that these investments are unable to detect modern attacks and provide limited efficiency gains within the SOC. Join our conversation to learn more about how the application of User Behavior Analytics can improve data loss prevention through better detection, incident prioritization, and breach forensics.
ISE® PRIVATE DINNER
Bringing the Malware Threat to Zero
5:30pm - 8:30pm
The Palm Restaurant, Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Brian Phillips
Vice President, IT and Information Security
Macy’s Inc.
Biography
While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. More malware was found in the past two years than in the previous 10 years combined. Malware complexity is increasing as cybercriminals refine their intrusion techniques, masking malware signatures and varying attack methods. Zero-day attacks in particular have continued to grow as newer malware are finding ways to bypass traditional security measures. Join our conversation to learn how you can protect your organization’s network and systems against malware attacks via threat extraction, CPU-level inspection, and sandboxing techniques.
ISE® PRIVATE DINNER
Fighting Cybersecurity Adversaries Despite the Global Staffing Shortage: Exploring the Role of Automation in Detection and Response
Devon Bryan
VP, Global Technical Security Services (CISO)
Automatic Data Processing, Inc.
Biography
While some claim that the state of cyber security has reached full-blown systemic failure, the growing realization that we live in a post-breach world is driving new approaches that promise a brighter future in the fight against cyber-security adversaries. Join the discussion to learn about finding the right mix of human talent and innovative technologies to overcome the security talent shortage and defeat advanced threats that may already be inside your organization.