Archived Events 2016

ISE® PRIVATE DINNER
There’s a Service for That – Enhancing your Security with Data Loss Prevention Services

December 8, 2016
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
217 Stuart Street
Boston, MA 02116
Ken Patterson

Ken Patterson
CISO
Harvard Pilgrim Health Care
Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. For many organizations, protecting their trade secrets and intellectual property means implementing a data loss prevention (DLP) program that allows them to encrypt information, track when it leaves the company firewall, and alert information-technology managers when users attempt to violate policy. Without data Loss prevention technology and tactics embedded at the core of their company’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join our conversation to learn why DLP should be fundamental to your security strategy and learn how you can achieve enterprise-wide threat visibility across your environment and benefit from big data analytics and integrated threat intelligence services.

ISE® PRIVATE DINNER
Cyberattacks on the Rise: How The Oil & Gas Industry Are Combatting Security Threats

December 8, 2016
5:30pm - 8:30pm
Pappas Bros. Steakhouse Downtown
Houston Center
1200 McKinney St
Houston, TX 77010
Larry Brock

Larry Brock
Retired CISO/ ISE® Industry Expert
Dupont/T.E.N.
Biography

Cyber threats and attacks against the oil & gas industry have shown no sign of slowing down as threats become increasingly complex and sophisticated. Cybersecurity threats have rapidly escalated since 2008, when the industry fell victim to nation-state attacks and resulted in the theft of bid-lease data, seismic markups and intellectual property. Now, with the exploitation of new cost-effective use of digital technologies and increased dependence on cyber structures, the oil and gas industry is exposed to increased losses primarily stemming from the activities of malicious, compromised and/or careless internal users. As most oil & gas facilities are now connected to the Internet in some capacity, protecting vital digital infrastructure against cyber-attacks is crucial in ensuring safe operations and optimal production regularity. Join the conversation with your peers to learn more about some of the major threats facing the industry and how to protect your sensitive data against insider threats and industrial espionage.

ISE® PRIVATE DINNER
There’s a Service for That – Enhancing your Security with Data Loss Prevention Services

December 6, 2016
5:30pm - 8:30pm
Absinthe Brasserie & Bar
398 Hayes Street
San Francisco, CA 94102
perumal_kannan

Kannan Perumal
Chief Information Security Officer
Applied Materials, Inc.
Biography

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. For many organizations, protecting their trade secrets and intellectual property means implementing a data loss prevention (DLP) program that allows them to encrypt information, track when it leaves the company firewall, and alert information-technology managers when users attempt to violate policy. Without data Loss prevention technology and tactics embedded at the core of their company’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join our conversation to learn why DLP should be fundamental to your security strategy and learn how you can achieve enterprise-wide threat visibility across your environment and benefit from big data analytics and integrated threat intelligence services.

ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses against Malware and Ransomware

November 30, 2016
5:30pm - 8:30pm
Eddie V’s Prime Seafood and Steak
4400 W Boy Scout Blvd
Tampa, FL 33607
Dave Summitt

Dave Summitt
Chief Information Security Officer
Moffitt Cancer Center
Biography

While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.

The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques.

ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Information in Motion

November 17, 2016
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center West
Dunwoody, GA 30346
Julie Talbot-Hubbard

Julie Talbot-Hubbard
SVP, Head of Information Security Operations
SunTrust Banks, Inc.
Biography

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.

ISE® PRIVATE DINNER
The Digital Communication Conundrum

November 16, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
shumard

Craig Shumard
Principal
Shumard Associates
Biography
ISE® Tri-State Award Winner 2005
ISE® Luminary Leadership Award Recipient 2010

Email was never designed to be a secure medium, yet we use it every day in corporate communications. As you well know, it has become the bane of our existence. Growth in digital business transactions, rising regulation demands and increased security threats has reinvigorated demand for adaptable email encryption. Confidential financial statements, medical records, travel itineraries and investment information are regularly sent unencrypted. To maintain trust and demonstrate a commitment to safeguarding customers' demands for privacy, organizations are under increasing pressure to find game-changing digital solutions. Join our conversation as we delve into the link between encryption, revenue growth, and customer trust.

ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses against Malware and Ransomware

November 15, 2016
5:30pm - 8:30pm
The Club
1 Robert S Smith Dr
Birmingham, AL 35209
Ashley Ewing

Ashley Ewing
CISO
The University of Alabama
Biography

While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.

The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques.

ISE® North America Leadership Summit and Awards 2016

The ISE® North America Leadership Summit and Awards was held November 9-10, 2016 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® NORTH AMERICA PRIVATE WELCOME DINNER & ELECTION VIEWING PARTY
Orchestrating a Move Away From the Silos

November 8, 2016
5:30pm - 10:30pm
David Burke’s Primehouse
616 N Rush St
Chicago, IL 60611
brenda callaway

Brenda Callaway
Executive Director, Information Security
Health Care Service Corporation- Blue Cross and Blue Shield of Illinois
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

Additionally, as our dinner will be held on Election Day, ServiceNow and T.E.N. will be hosting a special viewing party immediately following the dinner to view the election results. This after-party will also be held at David Burke’s Primehouse in their private library room, which will feature televisions, couches, desserts, and after-dinner drinks. Join your fellow InfoSec Executives after an evening of engaging collaboration and discussions to relax and view the election results!

ISE® PRIVATE DINNER
Information Security Iceberg: Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information

November 2, 2016
5:30pm - 8:30pm
The Castaway Burbank
1250 E Harvard Rd.
Burbank, CA 91501
Dierickx_Michael

Michael Dierickx
Director Security Engineering/Information Security Officer
Panasonic Avionics
Biography

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. The need to collaborate securely across international boundaries creates additional challenges for your business. Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders. Are we truly safeguarding against data privacy and data security — or are these breaches the tip of the iceberg?

Join us for a candid discussion with your peers as we calculate the impact of information security from a risk and cost perspective and explore real-world challenges in protecting information. We will address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment

ISE® PRIVATE DINNER
Protecting your Assets at Risk - Keeping your Assets out of Harm’s Way


October 27, 2016
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Steve Zalewski

Steve Zalewski
Chief Security Architect
Levi Strauss
Biography

Many of today’s enterprises approach cyber security from a technology point-of-view. They purchase point solutions which end up operating in siloes, never intersecting. Yet as the business environment becomes even more complex, threat actors become more sophisticated, and more sensitive data needs protection, enterprises must shift their tactics to effectively keep their assets safe. They must adopt a risk-based approach to cyber security which means bringing together threats, vulnerabilities, the value of the assets at risk and other business context to determine where their greatest risk lies and how to reduce it. They must also make security everybody’s business – from security teams to line-of-business application owners that govern valued assets to boards of directors – enabling all parties to do their part in proactively reducing risk. Join our conversation and learn how to develop a risk based cyber security program to better identify, communicate and reduce the risk of your most valued assets from getting breached.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

October 20, 2016
5:30pm - 8:30pm
Jacob & Co. Steakhouse
12 Brant St,
Toronto, ON M5V 2M1
Canada
Marc Stefaniu

Marc Stefaniu
Director - Information Security Governance, Risk and Compliance
TMX Group Inc.

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

October 18, 2016
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 E Trade St, Epicentre
Charlotte, NC 28202
Hafid Elabdellaoui

Hafid Elabdellaoui
Managing Director- IT Security & Compliance
Duke Energy
Biography

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

October 11, 2016
5:30pm - 8:30pm
Edge Steak & Bar
Four Seasons Hotel Miami
1435 Brickell Ave
Miami, FL 33131
Ana Roldan

Ana Roldan
AVP, Chief Information Security Officer
Miami Dade College
Biography

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® Northeast Executive Forum and Awards 2016

The ISE® Northeast Executive Forum and Awards 2016 will be held on October 4, 2016 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® NORTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

October 3, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
David Ritenour

David Ritenour
Managing Director, CISO
Blackrock Inc.
Biography

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® PRIVATE DINNER
Protecting your Assets at Risk - Keeping your Assets out of Harm’s Way

September 29, 2016
5:30pm - 8:30pm
Nick & Sam’s
3008 Maple Ave
Dallas, TX 75201
Gary Toretti

Gary Toretti
VP & Chief Information Security Officer
Sabre Corporation
Biography

Many of today’s enterprises approach cyber security from a technology point-of-view. They purchase point solutions which end up operating in siloes, never intersecting. Yet as the business environment becomes even more complex, threat actors become more sophisticated, and more sensitive data needs protection, enterprises must shift their tactics to effectively keep their assets safe. They must adopt a risk-based approach to cyber security which means bringing together threats, vulnerabilities, the value of the assets at risk and other business context to determine where their greatest risk lies and how to reduce it. They must also make security everybody’s business – from security teams to line-of-business application owners that govern valued assets to boards of directors – enabling all parties to do their part in proactively reducing risk. Join our conversation and learn how to develop a risk based cyber security program to better identify, communicate and reduce the risk of your most valued assets from getting breached.

ISE® PRIVATE DINNER
Preventing a Data Hostage Situation: Developing a Ransomware Preparedness Plan

September 28, 2016
5:30pm - 8:30pm
The Palm
Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Bob Varnadoe

Bob Varnadoe
Chief Information Security Officer
NCR Corporation
Biography

Ransomware has rapidly emerged as a significant threat to businesses and organizations of all verticals and sizes. In this day and age where data is invaluable, cybercriminals are taking advantage of people who don’t know a lot about malware behavior. Unfortunately, there is no silver bullet when it comes to ransomware. Being prepared to deal with it requires a multilayered, step-by-step approach for the best risk mitigation Join our conversation to learn how you can best protect your organization from ransomware and avoid business disruption, loss of productivity, damage to brand reputation and legal implications that come along with recovering from a ransomware attack.

ISE® PRIVATE DINNER
The Information Security Iceberg: Demonstrating the True Value of Data Privacy and Security

September 22, 2016
5:30pm - 8:30pm
The Boarding House
720 N Wells St.
Chicago, IL 60654
Craig Shumard

Craig Shumard
Retired CISO, CIGNA
ISE® Industry Expert, T.E.N.
ISE® Luminary Leadership Award Recipient 2010
Biography

Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders, but have we fully uncovered the true value of data privacy and security — or is this the tip of the iceberg? Join us for a candid discussion with your peers as we analyze the legal ramifications and punitive damages of data and security breaches, calculate the impact of cyber risk from a liability and cost perspective and explore real-world challenges in protecting information.

ISE® PRIVATE DINNER
Security on the Move: Keeping Mobile Threats at Bay

September 21, 2016
5:30pm - 8:30pm
Vic & Anthony’s Steakhouse
1510 Texas Ave
Houston, TX 77002
David Dang

David Dang
SVP/CIO
Primeway FCU
Biography

Unique to this dinner, guests will have the pleasure of enjoying fine wines paired with the most delicious meals. We will periodically break up the conversation when each wine is brought out for tasting with an appropriately-paired, dinner course. Each pairing will be described and discussed as you partake in them, providing plenty of time to enjoy the combination flavors before we resume discussion.

As smartphones and tablets become more powerful, securing devices and data is critical for enterprise mobility stakeholders. For instance, more than half of all decision makers in a recent IDC survey experienced security and compliance issues during mobility rollouts. With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need security that integrates with existing systems for continuous protection. Join our conversation to learn how your organization can better defend against mobile attacks and why comprehensive mobile security is required to keep devices and data safe.

ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration

September 21, 2016
5:30pm - 8:30pm
Flank
74, Tower Rd
Waltham, MA 02451
Vincent Campitelli

Vincent Campitelli
Retired VP IT Risk Management/ ISE Industry Expert
McKesson Corporation

Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

September 20, 2016
5:30pm - 8:30pm
The Capital Grille
2223 N Westshore Blvd
Tampa, FL 33607
Nicholas Shevelyov

Ennis Alvarez
VP of IT Infrastructure
Rooms To Go
Biography

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

InfoSec Nashville: What Keeps You Up at Night? Potential InfoSec Challenges for CISOs in the Coming Future

September 20, 2016
2:15 pm –3:05 pm
Music City Center
201 5th Avenue South
Nashville, TN 37203
More Details
Marci McCarthy

Marci McCarthy
CEO & President
T.E.N.
Biography

Panelists include:
Jennifer Cole, VP Information Security & Governance, ServiceMaster
Joseph Johnson, CISO, Premise Health
William Crank, CISO, MEDHOST

The Information Security industry started out working with technology as simple as antivirus software and firewalls that succeeded in thwarting adversary attacks. But within the past 10-15 years, the industry has evolved rapidly. Today we must deal with advanced concepts such as the Internet of Things; biometrics; APTs; threat intelligence; and more that require innovative strategies to combat—antivirus and firewalls are no longer enough. Threats to the industry are diligent, and as a result we ask ourselves: where is this leading the industry? What technology must we look for? What must we do to stay on the cutting edge?

ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses Against Malware and Ransomware

September 19, 2016
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219
Michael Mangold

Michael Mangold
Vice President, IT Security & BCP/DR
Tractor Supply Company
Biography

While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.

The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques. Our dinner will be hosted the evening before the 2016 InfoSec Nashville Conference, so kick off your conference experience by joining us for engaging discussions over dinner.

ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence

September 15, 2016
5:30pm - 8:30pm
Mitchell’s
45 North Third Street
Columbus, OH 43215
Larry Wilson

Helen Patton
Chief Information Security Officer
The Ohio State University
Biography

Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.

ISE® PRIVATE DINNER
Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information

September 15, 2016
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Nicholas Shevelyov

Nicholas Shevelyov
Chief Security & Privacy Officer
Silicon Valley Bank
Biography

In today’s threat landscape, the high frequency of unauthorized intrusions drive an ever-increasing need to maintain security, access and control of mission-critical information. From simple sharing of proprietary documents to surveillance and monitoring, corporations struggle to maintain efficiency without creating unnecessary risk. The need to collaborate securely across international boundaries creates additional challenges for your business. Join us for a conversation with your peers to address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment.

ISE® PRIVATE DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

September 14, 2016
5:30pm - 8:30pm
The Palm
1750 Tyson's Boulevard
McLean, VA 22102
Deborah Wheeler

Deborah Wheeler
Chief Information Security Officer
Freddie Mac
Biography

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

September 14, 2016
5:30pm - 8:30pm
El Gaucho
2505 1st Ave.
Seattle, WA 98121
Sean Murphy

Sean Murphy
VP, CISO
Premera Blue Cross
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

September 13, 2016
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Douglas Crawford

Douglas Crawford
Vice President Network Services
Warner Bros. Entertainment Inc.
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® PRIVATE DINNER
IT Hygiene– What’s Your Source of Truth? And How Much Do You Trust It?

September 8, 2016
5:30pm - 8:30pm
Truluck’s
777 Brickell Ave
Miami, FL 33131
Ken Athanasiou

Ken Athanasiou
VP, Chief Information Security Officer
AutoNation
Biography

Good IT hygiene is essential for good security in every organization but is being consistently overlooked by Enterprises. What’s the point of worrying about Zero-Days and APTs if you can't answer with confidence what systems are on your network, what's running in your environment or whether your systems are patched? It's time to do the basics, better.

Join our conversation to discuss how security hygiene and having shared visibility by both IT Operations and Security can more effectively allow an organization to detect, investigate, remediate and build good security hygiene into ongoing IT operations processes. We’ll discuss how innovative technologies can improve cyber resilience and enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Stay Out of Breach Headlines: Protect your critical Web applications and sensitive customer data against cyber-attacks

August 31, 2016
5:30pm - 8:30pm
The Capital Grille
201 N Tryon St.
Charlotte, NC 28202
Christofer Hoff

Christofer Hoff
SVP, Cyber Security Technology
Bank of America Merrill Lynch
Biography

Your financial institution is a high-value target for cyber criminals. According to the 2016 Verizon Data Breach Report, financial services is the most breached industry, accounting for 35% of breaches last year. Cyber-attackers are after the sensitive data your institution collects – customer personally identifiable information (PII) and account data. As today’s cyber-attacks become increasingly sophisticated with criminals exploiting users and web applications to steal data, it is imperative to develop a multi-layered security strategy.

Join your peers for a discussion over dinner on how they are protecting what matters most –customer PII, account and financial data and the applications that access that data.

ISE® PRIVATE DINNER
Mobile & IoT Applications: Discovering the Missing Security Link

August 25, 2016
5:30pm - 8:30pm
The Palm - Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Phil Agcaoili

Phil Agcaoili
Chief Information Security Officer
Elavon
Biography

Today’s mobile and IoT software applications are entrusted to securely transfer funds, manage people’s healthcare, and perform other critical functions without fail. A number of major organizations are also starting to invest more in IoT applications and R & D development for future IoT related projects. However, 97% of applications lack adequate binary protections, leaving mobile and IoT applications vulnerable to data compromise, IP theft, and manipulation. Join our conversation to learn more about the kinds of risks presented by IoT applications and what some companies are doing to prepare for a new threat vector.

WOMEN IN CYBER TECHNOLOGY

August 22, 2016
5:30pm - 7:30pm
L'alliance Française
Colony Square, 1197 Peachtree St NE #561
Atlanta, GA 30361
Marci McCarthy

Marci McCarthy
CEO & President
T.E.N.
Biography

Women make up just under half of the US workforce overall. Yet only about 10% of the cyber security workforce is female even though there is currently a significant shortage of skilled cyber technology professionals. The Netherlands American Chamber of Commerce is privileged to have a panel of outstanding women from the private and government cyber technology arenas. Our experts will share with you their own experiences about overcoming challenges and forging successful careers in this critically important and growing field. Join us on Monday August 22nd to discuss why women are underrepresented in the cyber world and what we can do to change this.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

August 17, 2016
5:30pm - 8:30pm
Eddie Merlot’s Steakhouse
455 S 4th St #102
Louisville, KY 40202
Carl Alexander

Carl Alexander
Information Security Manager
United Parcel Service, Inc.
Biography

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration

August 10, 2016
5:30pm - 8:30pm
The Capital Grille- Tyson’s Corner
1861 International Dr.
McLean, VA 22102
Jerry Archer

Jerry Archer
Chief Security Officer & SVP
Sallie Mae
Biography

Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.

ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration

August 9, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Jeffrey Dimuro

Jeffrey Dimuro
Chief Security Architect
Salesforce

Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.

ISE® VIP RECEPTION
Returning Power to the Defender