ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value
Dale Drew
Chief Security Strategist
CenturyLink
Biography
A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.
ISE® PRIVATE DINNER
Reducing Cyber Exposure for the Modern Attack Surface
Chris Bitner
Global Chief Information Security Officer
Bloomin’ Brands, Inc.
Biography
Today’s IT landscape has a very different attack surface than the traditional data center of years past. Modern assets like cloud instances, web-based applications, mobile devices, application containers, and many more interconnected tools and solutions have different characteristics that can greatly affect your security and risk management program without proper guidance and management in place. Join our conversation as we discuss the impact of the modern cyber exposure gap and what you can do to help reduce your organization’s overall attack surface.
ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value
Michael Mangold
Vice President, Information Security
Tractor Supply Company
Biography
A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.
ISE® PRIVATE DINNER
Act, Don’t React: Stopping Attackers with Infrastructure-Wide Deception
5:30pm - 8:30pm
The Capital Grille (Dunwoody)
94 Perimeter Center W
Dunwoody, GA 30346
Curley Henry
Director, Cybersecurity Strategy & Architecture
Southern Company
Biography
Although attacks come in many variations and styles, the majority of them start through endpoints—particularly user endpoints—and then spread laterally through systems, looking to exploit richer and richer targets. Deception technology anticipates these movements by turning every endpoint and server on the network into a trap. Deceptions are planted that are made to look like information or objects that will help the attacker advance his effort. When an attacker engages with a deception, and alarm is tripped. At this point, responders have a wealth of tools they can use to track the attacker and take action. Join our conversation to learn how by deploying deception technology across your entire infrastructure, you can uncover attackers in your network much sooner, and gain real-time, situational awareness that empowers your security team to act, before attackers can reach your critical systems.
ISE® North America Leadership Summit and Awards 2017
The ISE® North America Leadership Summit and Awards was held November 15-16, 2017 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
Fidelis Elite Private Yacht Dinner Cruise
6:30pm - 10:00pm
Atlantica by Bateaux New York, Spirit of New Jersey
Pier 61, Chelsea Piers
New York, NY 10011
Marci McCarthy
CEO and President
T.E.N.
Biography
Mike Towers
VP & Chief Information Security Officer
Allergan
Biography
John Johnson
Founding Board Member
Security Advisor Alliance
Biography
Join T.E.N. and Fidelis at the Atlantica Yachts in New York, NY for an evening private dinner yacht cruise. Network with other CISOs at this exclusive and intimate event as well as enjoy premium cocktails, dinner, and an incredible cruise through stunning New York Harbor. Special guest hosts and speakers for the evening include Marci McCarthy, CEO and President for T.E.N., Mike Towers, VP & CISO for Allergan, and John Johnson, Founding Board Member for Security Advisor Alliance. We hope that you can join us for an evening of great networking opportunities in a new and unique setting. Connect with other security leaders from New York and be among the first to hear about Fidelis' new research.
ISE® PRIVATE DINNER
Security at DevOps Speed and Scale: A Faster and More Agile Approach to Cloud Security
Carl Burgess
SVP, GISO Branded Cards & CRS
Citigroup Inc.
Biography
As organizations move to the cloud, finding some homogeneity across tools and consolidating systems will prove invaluable in maintaining system security and patch levels over time, especially in a dynamic DevOps-driven architecture. DevOps is built on principles of automation, rapid feedback, focus on testing throughout the process, collaboration, and consistent release practices. This model can also provide a great opportunity for improved security. Security teams need tools to partner effectively with DevOps groups so each team can work to its highest abilities, pushing both goals forward rather than working at cross-purposes. Join our conversation to learn how you can improve your organization’s security by integrating it more tightly into the development process without introducing roadblocks and enable security within agile development environments.
ISE® PRIVATE DINNER
IT and OT Convergence: Technology Enables & Silos Kill
David Alexander
Chief Information Security Officer
Los Angeles Department of Water and Power
Biography
There is a cyber security challenge facing most companies that technology has not solved. The blind spot between departmental security initiatives that can create seams, which in turn, allows hackers access to corporate data. One example is the traditional relationship between enterprise information technology (IT) and operational technology (OT) teams who operate separately, each with their own set of priorities. While IT focuses on anticipating emerging threats to computer systems, OT typically focuses on the operation of generation or production systems – whereby security can be viewed as secondary. While the impact of a security incident on most IT systems is limited to financial loss, attacks on OT can potentially endanger human life and threaten national security. Both IT and OT face increased risk by third-party vendors, such as contractors working onsite or vendors that have network access, and both teams have information that could help secure the other. There is a growing need for these two teams to communicate, but this can be a challenge due to their differing priorities and operating cultures. Other "organizational silo" examples include IT and physical security where cultural norms keep both sides from sharing security event information. While technology is an enabler that can provide visibility and threat detection, communication between the two teams is key to successfully securing both IT and OT environments. Join our conversation as we discuss the security silos within organizations, the cyber security issues that are bringing the IT and OT together, the challenges that they must overcome, and how visibility and communication, enabled by technology, are the answer to a successful relationship between both teams.
ISACA South Florida: Connecting Women Leaders in Technology Conference
Speaker Session: Building for the Future: Inspiring the Next Generation of Women in Technology
Marci McCarthy
CEO and President
T.E.N.
Biography
It is important for young women to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of women in technology through mentorship opportunities, STEAM programs, and other education opportunities.
ISE® PRIVATE DINNER
Why Cybersecurity Needs Eyes, and AI, on the Inside
Duaine Styles
Chief Information Security Officer
Torchmark Corp.
Biography
Analysts are buried in false positives, struggling to manually put the many pieces together to identify truly critical threats. Defending against cyber adversaries requires a new approach—one that considers the unique characteristics of adversary goals and behavior. AI can identify and tie together sets of behaviors that adversaries must use, but which are statistically unlikely for legitimate users and systems to accidentally perform in the course of normal operations. If you have the data you need to enable forensics post-incident, you also have the data you need to detect an adversary before they achieve their objective. Join our conversation to learn more about how the addition of AI can provide visibility and correlation across all systems and give network defenders the opportunity to gain the upper hand against adversaries now and into the future.
ISE® PRIVATE DINNER
Building an Effective Detection and Response Program to Stop Targeted Attacks: Achieve Zero Breach Tolerance
5:30pm - 8:30pm
The Capital Grille (Buckhead)
255 East Paces Ferry Rd NE
Atlanta, GA 30305
Tom Noonan
Experienced Cyber Security Entrepreneur, Director and Investor,
Co Founder & Board of Directors
Endgame
Biography
A recent Forrester survey found that 93% enterprises are hit by targeted attacks. These attacks are sophisticated, human-driven, and not just malware based. Enterprise security tools are constantly bypassed and SOC teams are overwhelmed with alerts and anxious of missing never-before-seen attacks. It is critical for security decision makers to ensure their people, process, and technology can stop targeted attacks. Enterprise SOC and hunt teams need solutions that address full scope of targeted attacks, automated workflows, instant and accurate response at the earliest stages of the attack lifecycle.
Join us for a conversation to learn how you can pivot your existing resources to combat targeted attacks by focusing on stopping attackers at the earliest stages of the attack life cycle.
ISE® PRIVATE DINNER
Security at DevOps Speed and Scale: A Faster and More Agile Approach to Cloud Security
Bernie Cowens
Vice President, Chief Security Officer
PG&E- Pacific Gas & Electric Company
Biography
As organizations move to the cloud, finding some homogeneity across tools and consolidating systems will prove invaluable in maintaining system security and patch levels over time, especially in a dynamic DevOps-driven architecture. DevOps is built on principles of automation, rapid feedback, focus on testing throughout the process, collaboration, and consistent release practices. This model can also provide a great opportunity for improved security. Security teams need tools to partner effectively with DevOps groups so each team can work to its highest abilities, pushing both goals forward rather than working at cross-purposes. Join our conversation to learn how you can improve your organization’s security by integrating it more tightly into the development process without introducing roadblocks and enable security within agile development environments.
ISE® Northeast Executive Forum and Awards 2017
The ISE® Northeast Executive Forum and Awards 2017 was held on October 11, 2017 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions.Details
ISE® NORTHEAST PRIVATE WELCOME DINNER
Key Requirements for Successful, Business-Driven Network Security Policy Management and Automation
Tod Mitchinson
Vice President, Chief Information Security Officer
New York Life Insurance Company
Biography
Network and Security teams are often perceived as standing in the way of innovation and business agility. When an enterprise rolls out a new application or migrates an application to the cloud it can take weeks or even months to ensure that all the security devices and network segments can communicate with each other, and at the same time prevent access to hackers and unauthorized users. But IT does not need to be a bottleneck to business agility. Nor is it necessary to accept more risk to satisfy the demand for speed. The solution is to take a business-driven approach to security policy management that aligns security with business processes using automation. Join our conversation to discuss the requirements of taking an application-centric approach to managing security that will help improve business agility, reduce risks, ensure compliance and lower operating costs.
TAG: Women in Business North America Summit
Mentor Session
Marci McCarthy
CEO and President
T.E.N.
Biography
During this year’s Women in Business North America Summit, Marci McCarthy, CEO and President of T.E.N. will lend her expertise and knowledge on business management and executive leadership.
Supernova South
Speaker Session: Defending the Digital Side of Business: Protecting Your Organization’s Brand
Marci McCarthy
CEO and President
T.E.N.
Biography
Cyber-criminals are attacking every part of the enterprise. Whether it’s via a data breach, ransomware, or phishing scheme, there remains a vast sea of threats out there capable of doing severe damage to companies of all shapes and sizes. However, there are also potential attack vectors that organizations sometimes overlook. Social media platforms have become the predominate form of customer communication for many companies and have also become a prime target for security-related threats. Join Marci McCarthy, CEO and President of T.E.N. as she discusses the importance of maintaining a secure social media and online presence and why doing so is vital to your organization’s e-commerce, infrastructure, and overall brand value.
ISE® PRIVATE DINNER
Stop Breaches in Real-Time Based on User Behavior
5:30pm - 8:30pm
CHOPS Restaurant and Bar
1701 John F Kennedy Blvd
Philadelphia, PA 19103
Craig Shumard
Retired CISO, CIGNA
ISE® Industry Expert, T.E.N.
Biography
A recent Forrester study noted an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years. These breaches have resulted in billions of compromised user names and passwords, further increasing the risk of subsequent breaches. Armed with these stolen credentials, an attacker has just the camouflage they need to “look” like a legitimate user – where they can infiltrate and move laterally through an organization without raising suspicion. Risk-based security solutions that include integrated machine learning can help IT identify suspicious activity in real-time and respond quickly to stop a potential breach in progress.
Join our conversation to learn how machine learning enables access based on user behavior, helping your security team better implement risk-based policy to protect your organization’s entire hybrid IT environment.
InfoSec Nashville
Breakout Session: Cybersecurity Success Through Emotional Intelligence
Marci McCarthy
CEO and President
T.E.N.
Biography
As attackers find new ways to disrupt security and business, security professionals must grow as proactive innovators, communicators, and leaders. One of the greatest problems in communication is a clear understanding of what is being said, how it is received, and how people feel about it. Harnessing Emotional Intelligence affects how we manage behaviors, navigate social complexities, and make decisions to achieve positive results. Join our conversation as we discuss utilizing Emotional Intelligence to get ahead, learn how to be authentic to yourself, how to shape your conversations as a thought leader, and how to show confidence and professionalism.
ISE® PRIVATE DINNER
The Industry Need for Cloud Generation Security
Bruce Jones
CISO & VP
Excellus BCBS
Biography
The unprecedented power of cloud applications has opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn't have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Symantec as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.
ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value
Matt Fearin
SVP, Chief Information Security Officer
Epsilon
Biography
A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.
ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Deborah Wheeler
CISO
Delta
Biography
A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.
ISE® PRIVATE DINNER
Why Cybersecurity Needs Eyes, and AI, on the Inside
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Hafid Elabdellaoui
Managing Director Cybersecurity and IT Compliance
Duke Energy
Biography
Analysts are buried in false positives, struggling to manually put the many pieces together to identify truly critical threats. Defending against cyber adversaries requires a new approach—one that considers the unique characteristics of adversary goals and behavior. AI can identify and tie together sets of behaviors that adversaries must use, but which are statistically unlikely for legitimate users and systems to accidentally perform in the course of normal operations. If you have the data you need to enable forensics post-incident, you also have the data you need to detect an adversary before they achieve their objective. Join our conversation to learn more about how the addition of AI can provide visibility and correlation across all systems and give network defenders the opportunity to gain the upper hand against adversaries now and into the future.
ISE® West Executive Forum and Awards 2017
The ISE® West Executive Forum and Awards 2017 was held on August 23, 2017 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions.
ISE® WEST PRIVATE WELCOME DINNER
The Myths and Realities Of Operationalizing Big Data Security Analytics
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St. Lower Level
San Francisco, CA 94102
Al Ghous
Sr Director, Cyber Security
GE Digital
Biography
Gartner calls big data security analytics the “Next Big Thing.” It promises to automate the threat detection process, remove false positives from undermining effective security operations, and offer visibility to unseen and unknown threats, all at scale. Yet to implement it, organizations must work through the practical challenges of deploying and operationalizing this new and transformative technology. Requirements must be carefully defined, including use case coverage, data source requirements, security operations process changes, and incident response optimization. Join our conversation around deploying big data security analytics where we will delve into how companies have successfully deployed this technology and discuss topics like how to choose the correct technology, behavioral analytics proper fit in security operations, and defining successful metrics to measure results.
ISE® PRIVATE DINNER
The Myths and Realities Of Operationalizing Big Data Security Analytics
Pete Chronis
Chief Information Security Officer
Turner Broadcasting System - Time Warner
Biography
Gartner calls big data security analytics the “Next Big Thing.” It promises to automate the threat detection process, remove false positives from undermining effective security operations, and offer visibility to unseen and unknown threats, all at scale. Yet to implement it, organizations must work through the practical challenges of deploying and operationalizing this new and transformative technology. Requirements must be carefully defined, including use case coverage, data source requirements, security operations process changes, and incident response optimization. Join our conversation around deploying big data security analytics where we will delve into how companies have successfully deployed this technology and discuss topics like how to choose the correct technology, behavioral analytics proper fit in security operations, and defining successful metrics to measure results.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Judy Hatchett
Sr. Global Manager, Information Security Risk & Compliance
3M Corporation
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
The Myths and Realities Of Operationalizing Big Data Security Analytics
5:30pm - 8:30pm
Chamberlain’s Steak and Chop House
5330 Belt Line Rd
Dallas, TX 75254
Lance Clark
Director, Information Security
Cinemark
Biography
Gartner calls big data security analytics the “Next Big Thing.” It promises to automate the threat detection process, remove false positives from undermining effective security operations, and offer visibility to unseen and unknown threats, all at scale. Yet to implement it, organizations must work through the practical challenges of deploying and operationalizing this new and transformative technology. Requirements must be carefully defined, including use case coverage, data source requirements, security operations process changes, and incident response optimization. Join our conversation around deploying big data security analytics where we will delve into how companies have successfully deployed this technology and discuss topics like how to choose the correct technology, behavioral analytics proper fit in security operations, and defining successful metrics to measure results.
ISE® PRIVATE DINNER
Protecting Against Digital Deception--The Rise of “Artificial Perception” to Automate the Detection and Prevention of Cyber Attacks
5:30pm - 8:30pm
Bouchon Bistro- The Venetian
3355 S Las Vegas Blvd
Las Vegas, NV 89109
Ken Haertling
Senior VP, Global Cybersecurity
Las Vegas Sands
Biography
For all the protection we afford to networks, applications and data, the human element of enterprises remains the most exposed, vulnerable and frequently attacked point of entry into any enterprise. While traditional attacks leverage technology-based system vulnerabilities, such as software bugs and misconfigurations, social engineering attacks take advantage of human vulnerabilities by using deception to trick targeted victims into opening the doors to hackers. It’s time to better protect and defend this vulnerability. It is possible to automate the process by which people decide whether or not they can trust an email or other communication channel and leverage existing technology to look for signs of digital deception. This approach, which goes beyond the often over-hyped term “artificial intelligence”, represents a new form of “Artificial Perception,” and can prevent or mitigate damage in real time. To remain relevant, these automated defenses must not just “think like computers,” but also model what makes messages deceptive to end users. Join our conversation as we discuss how this bold and proven approach can help you avoid critical system breaches.
ISE® PRIVATE DINNER
Best Practices for Detecting Insider Threats
Mark Kelton
Former Deputy Director of the National Clandestine Service for Counterintelligence, CIA
Board Advisor, RedOwl
Biography
Richard Rushing
CISO
Motorola Mobility
Biography
People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.
ISE® PRIVATE DINNER
Best Practices for Detecting Insider Threats
5:30pm - 8:30pm
The Palm
Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta, GA 30326
Mark Kelton
Former Deputy Director of the National Clandestine Service for Counterintelligence, CIA
Board Advisor, RedOwl
Biography
Tom Dager
VP, Head of Enterprise Security, Americas
Worldpay
Biography
People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.
ISE® PRIVATE DINNER
Building a World-Class Security Operations Center
Marcia Peters
Senior Vice President, Info Security Governance, Risk and Compliance
U.S. Bank
Biography
As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.
ISE® PRIVATE DINNER
Securing your Digital Transformation through Comprehensive Managed Detection and Response Services
Vas Rajan
Managing Director & Chief Information Security Officer
CLS Bank
Biography
Businesses are more digital than ever. Whether they have been digital from the start or are in the process of transitioning to a more digital environment, there is no doubt that more and more business is done online or via mobile phones. Engagement with customers is also thriving on digital channels such as social media, company websites and a variety of other online services. While all of these things provide a wealth of communication and business driving opportunities, they also expose businesses to far more threats than they were accustomed to in the past. Be it through their own digital channels or through 3rd party vendors who are integrated with their business assets. Join our conversation to learn how you can improve your digital security defenses by using a holistic approach for protection that goes beyond the perimeter and identifies threats in advance all the while, checking the company’s resilience to the threat by taking the attackers’ perspective.
ISE® PRIVATE DINNER
Building a World-Class Security Operations Center
Kimberly Van Nostern
ISE® Industry Expert
T.E.N.
Biography
As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.
ISE® PRIVATE DINNER
Building a World-Class Security Operations Center
Joey Johnson
CISO
Premise Health
Biography
As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Jasper Ossentjuk
SVP, Chief Information Security Officer
TransUnion, LLC
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
Perimeter Place
4501 Olde Perimeter Way
Atlanta, GA 30346
Michelle Stewart
VP, Information Security Intelligence & Response
Elavon
Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Robert Knoblauch
Vice President, Enterprise Security Services, Information Security & Control
Scotiabank
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Deborah Flynt
Global Information Security Officer
Carestream
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Managing Technology Risk and Compliance in an Expansive Digital Infrastructure
Rich Licato
CISO
ARC
Biography
Organizations are complex. Modern organizations have become an interconnected mesh of digital transactions, relationships, and interactions that obfuscate traditional business boundaries. Keeping this complexity and change in sync and secure is a significant challenge for boards, executives, as well as risk management and GRC professionals throughout the business. The dynamic, distributed, and disruptive nature of business is particularly challenging from an information security standpoint as IT security, risk, and compliance must all be sustainable as an ongoing and integrated part of IT processes and the broader business. The primary directive of a mature IT risk management program should be to deliver effectiveness, efficiency, and agility to the business in managing the interrelationship of performance and risk management. This requires a strategic approach that connects the enterprise, business units, processes, transactions, and information to enable transparency, discipline, and control of the ecosystem of business and operational activities. Join our conversation as we discuss best practices for building and running an IT risk management program and maximizing its value from the convergence of strategy, process, and architecture.
ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting
Tomas Maldonado
CISO
International Flavors and Fragrances Inc.
Biography
Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.
ISE® Central Executive Forum and Awards 2017
The ISE® Central Executive Forum and Awards 2017 was held on May 17, 2017 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® CENTRAL PRIVATE WELCOME DINNER
Best Practices for Detecting Insider Threats
Harvey Ewing
CISO
G6 Hospitality LLC
Biography
Mark Kelton
Board Advisor
RedOwl
Biography
People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.
ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting
5:30pm - 8:30pm
Pappas Bros. Steakhouse Downtown
Houston Center
1200 McKinney St
Houston, TX 77010
Martin Littmann
CTO & CISO
Kelsey-Seybold Clinic
Biography
Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Jim Lemieux
Senior Director, Information Security
The Travelers Companies, Inc.
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting
Chris Lodico
Senior Director
Blue Cross Blue Shield of Illinois
Biography
Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Mary Haynes
VP, Network Security Operations
Charter Communications, Inc.
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Gary Warzala
Chief Information Security Officer
Fifth Third Bank
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
2017 Annual WNY ISACA Conference
8:00am - 6:00pm
DoubleTree by Hilton Hotel Rochester
1111 Jefferson Rd
Rochester, NY 14623
Website
Opening Keynote
Marci McCarthy
CEO and President
T.E.N.
Biography
Cybersecurity Success Through Emotional Intelligence
8:30-9:30 PM
As new threats abound and attackers continue to find new ways to disrupt security and business, information security professionals must continue to grow as proactive innovators, good communicators, and team leaders. One way to further this growth is through Emotional Intelligence. One of the greatest problems in communication is a clear understanding of what is being said, how it is received, and how people feel about an issue. Harnessing Emotional Intelligence is a good method to channel emotions towards a path that will benefit everyone. It affects how we manage behaviors, navigate social complexities, and make personal and professional decisions that achieve positive results. Join our conversation as we discuss the benefits around utilizing Emotional Intelligence in the work place to get ahead, learn how to be authentic to who you are, learn how to shape your conversations as a thought leader, and how to show confidence and professionalism in the fields of cybersecurity and information security.
Panel Moderator
Marci McCarthy
CEO and President
T.E.N.
Biography
Panelists
Deborah Cheek
EVP & CISO, Enterprise Compliance & Audits Cybersecurity Management
Claims Recovery Financial Services LLC
Biography
Deborah Flynt
Global Information Security Officer
Carestream
Biography
Mark Leary
Global Chief Information Security Officer
Regeneron Pharmaceuticals
ISE® Southeast Executive Award Winner 2010
ISE® Northeast Executive Award Winner 2019
ISE® North America Executive: Health Care Award Winner 2019
Biography
Patrick Stack
CISO and IT Director, Enterprise Architecture
Eastman Kodak Company
Breaking into Information Security
10:15-11:15 AM (Panel)
To become a security professional, you need a certain mix of experience, knowledge, and skills. While Information Security is by no means an entry level career field, that doesn’t mean it’s impossible to break into the field. A formal degree aside, hands-on experience gained in the security trenches is invaluable. A solid education and a foundation in systems administration, engineering and/or development are part of the "apprenticeship" that every security professional goes through. The key to making this type of transition is in learning and understanding security issues and finding a way to apply the knowledge. Join our conversation as we discuss at length the skills, background, and experience needed to help you break into the Information Security industry.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Adam Ely
Vice President, Information Security
& Deputy Chief Information Security Officer
Walmart
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Our ISE® Guest Host for the evening is the Chief Security Officer of a Major Telecommunications Company. This person will be revealed the night of the dinner!
Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.
ISE® PRIVATE DINNER
Get Secure. Stay Secure
5:30pm - 8:30pm
The Palm
The Westin Buckhead Atlanta
3391 Peachtree Rd NE
Atlanta, GA 30326
Paul Huesken
Chief Information Assurance Officer
The Coca-Cola Company
Biography
Your defenses are constantly being challenged by attackers who are morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence,” but are still finding themselves behind the eight ball when it comes to cyber threats. The struggle to get ahead and stay ahead of the ever-evolving cyber threat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and more than ever, you need a way to continuously validate your cybersecurity posture. Join our conversation to learn how you can apply contextual threat intelligence, product effectiveness validation, and security workflow automation to help your organization get secure, and stay secure.
ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation
Anthony Morrone
CISO
DuPont, Inc.
Biography
Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
Mike Coogan
Chief Information Security Officer
Waste Management
Biography
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
Frank Aiello
Chief Information Security Officer
The American Red Cross
Biography
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do the recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
Mark Odiorne
Senior Vice President, Enterprise Threat Intelligence & Collaboration Center
Bank of America
Biography
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Does the next generation of attacks validate your endpoint protection, your SOC and justify a hunt team?
5:30pm - 8:30pm
Harris’ The San Francisco Steakhouse
2100 Van Ness Avenue
San Francisco, CA 94109
Caleb Sima
Managing Vice President, Cyber Security
Capital One
Biography
A wave of next generation attacks that are ‘advanced’ and ‘unique’ has hit. Your Ops team is commissioned to keep protections in place, operational and up-to-date, and along comes the next generation of endpoint protection. As endpoints continue to be the entry point for many largescale attacks, it is imperative that security teams take preemptive measures to identify and monitor potential blind spots as early in the attack life cycle as possible. Your SOC is already overwhelmed and anxious of missing never-before-seen attacks. You are now asked to build a “hunt team” when hunters are scarce or unqualified.
Join us in a conversation about what has changed from the attackers’ and the defenders’ points of view, its impact on the SOC, implications for hunt teams and endpoint protection.
ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Mark Van Holsbeck
IT Risk and Security CISO
Avery Dennison Corporation
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
Jason Lish
Senior Vice President, Security Technology & Operations
Charles Schwab & Company
Biography
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® Southeast Executive Forum and Awards 2017
The ISE® Southeast Executive Forum and Awards 2017 was held on March 14, 2017 at the Westin Peachtree Plaza Downtown in Atlanta, GA.. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details
ISE® SOUTHEAST PRIVATE WELCOME DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
5:30pm - 8:30pm
Morton’s The Steakhouse
303 Peachtree Center Ave NE
Atlanta, GA 30308
Registration
Mark Reardon
AVP of Information Security & Chief Information Security Officer
WellStar Health System
Biography
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent
Chuck Markarian
CISO
PACCAR, Inc.
Biography
How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.
ISE® PRIVATE DINNER
Get Secure. Stay Secure
Donna Nemecek
VP—Risk and Compliance
BNY Mellon
Biography
Your defenses are constantly being challenged by attackers who are morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence,” but are still finding themselves behind the eight ball when it comes to cyber threats. The struggle to get ahead and stay ahead of the ever-evolving cyber threat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and more than ever, you need a way to continuously validate your cybersecurity posture. Join our conversation to learn how you can apply contextual threat intelligence, product effectiveness validation, and security workflow automation to help your organization get secure, and stay secure.
ISE® VIP Signature Luncheon
11:30 am-1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Great Room
More Information
Enterprise Security Response: The New CISO imperative
As cybercriminals become savvier, many organizations can’t keep pace with the volume and speed of attacks. What do you do when something goes wrong? How do you prioritize and resolve the most critical threats first? How do you make the security talent you have radically more effective?”
Connecting security and IT teams as well as best-of-breed security products through automation is the future of enterprise security response. Join our conversation as we discuss practical approaches that can help you dramatically improve the effectiveness of your security program.
ISE® VIP Signature Luncheon with Bay Dynamics
11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information
Quantifying Cyber Risk – If I Were To Fix One Thing Today, What Would I Do That Reduces Risk The Most?
In trying to monitor and protect their companies, most modern enterprises are overwhelmed with a deluge of threat and vulnerability data. With so much data to examine, the issue can quickly turn to where to focus first. How can enterprises continuously quantify their security exposures so that they know which remediation actions will reduce the most risk on any given day? Mapping actual financial impact to specific actual security exposures seen in your environment, to measure actual value at risk, makes the difference between time wasted and reduced risk exposure dollars saved. Join our conversation as we discuss how enterprises can effectively quantify cyber risk so that they can be more effective at actually protecting their business.
ISE® VIP Reception
6:00 pm - 8:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information
Who is Your Sensitive Data Guardian Angel?
Breaches are inevitable, losing sensitive data is not. As numerous, devilish threat actors continue to find new and increasingly detrimental ways to go after your organization’s data, your security team needs a guardian angel in the form of a stronger, agile, and all-encompassing Data Protection Platform. In this new reality, traditional perimeter-based approaches to security are insufficient – deeper visibility is required to guard against the evil threat actors trying to access sensitive data. Security professionals must take a data-centric approach that ensures security travels with the data regardless of user, location, or even hosting model.
Who wouldn’t be more confident with a guardian angel protecting their sensitive data throughout its lifecycle and across the enterprise? Join our evening of networking and mingling with peers to discuss the battles between evil adversaries and the guardian angels responsible for protecting your data.
T.E.N. & ISE® Sales and Marketing Breakfast at RSA® 2017
7:45 am - 10:00 am
The W Hotel
181 Third Street
San Francisco, CA 94103
Social Terrace
More Information
Straight from the CISO: Best Practices for Getting Marketing and Sales Results from Prospective Clients
This is an invitation-only program and attendance is limited to a select number of executives from solution provider organizations. Following registration, guests will receive personal notifications confirming their attendance.
Cold calls, big flashy emails, and unsolicited meeting notices are no way to reach out to a prospective customer. These antiquated and impersonal methods will largely go unnoticed or never see responses back from that target company or CISO. So what is the secret to getting your foot in the door for a meeting? What are the best strategies and methods for ensuring you connect with the right people at the right times and in an ethical and timely manner?
Find the answers to these important questions by asking a CISO yourself at the T.E.N.’s ISE® Sales and Marketing Breakfast during the 2017 RSA® Conference. Our panel of executive thought leaders will share their real world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation¹s top IT and security executives.
Symantec/ISE® VIP Signature Luncheon
12:00 pm – 2:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information
Integrated Cyber Defense for the Cloud Generation
Cyber security has never been more critical to organizations than it is today. In the cloud generation, attacks are coming through four primary vectors: the user and their devices, the data in all of its locations, over the web, and over email. This shift to the cloud changes everything and means that IT needs to develop a fully integrated cyber defense strategy. Join an engaging discussion with Symantec leadership and your peers, where you will gain insight into how you can better protect your company in the cloud generation.
ISE® VIP Reception
7:00 pm – 10:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information
Avoid Getting Hacked: The Importance of Mobile and IoT Protection in an App-Centric World
The rapid adoption and overall growth of mobile computing and the rise of the Internet of Things has created an app-centric global marketplace, ushering in new applications that are driving new business models and revenue. As hackers increasingly target both consumers and enterprise mobile apps, developers and security teams must quickly locate and remediate security gaps and launch strong, agile app protection measures to help mitigate risks that are prevalent in today’s mobile and IoT environment. Additionally, the continued proliferation of IoT technology in everything from cars, home security systems, and medical tech has opened up a variety of potential critical and highly interconnected attack vectors for threat actors to take advantage of. We now live in a world where the application itself has become the new perimeter that demands security. Join our evening of networking and mingling with peers to discuss how you can improve your mobile application security through the use of advanced obfuscation, encryption, and detection.
Carbon Black ISE® VIP Reception
6:00 pm – 8:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Mixx/Upstairs Bar
More Information
Replace AV, Stop All Attacks
When it comes to stopping cyber attacks, traditional antivirus (AV) no longer cuts it. In 2016, more than 50 percent of attacks evaded traditional AV by simply not using any malware. During the same time period, successful ransomware attacks cost businesses more than $1 billion. Traditional AV is failing. Cb Defense, Carbon Black’s cloud-based Next-Generation Antivirus (NGAV) protects organizations from all attacks (not just commodity malware) including: ransomware, obfuscated malware, 0-days, and non-malware attacks. Join us for an evening of networking to learn more about how your business can replace traditional AV today and stop all forms of cyber attacks.
ISE® VIP Welcome Reception
5:15 pm – 7:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Workrooms 2-3
More Information
Connect, Collaborate, and Celebrate!
T.E.N. is offering a unique networking opportunity the evening before RSA® Conference 2017. This year, we will be hosting an ISE® VIP Welcome Reception where executives and vendor representatives alike can mingle in the relaxed atmosphere of our evening theme: “Connect, Collaborate, and Celebrate.” Join us for an evening filled with exciting networking opportunities and thoughtful discussion with information security executives and vendors as we kick off this year’s RSA® Conference.
*For Security Vendors and Solution Providers Only: All ticket sales for the Sunday ISE® VIP Welcome Reception are final. In the event you are not able to attend, the cost of admission will not be refunded nor transferred as a credit to another T.E.N. - ISE® Program or sponsorship. If you would like to change the person attending on your behalf, please contact Deb Jones at djones@ten-inc.com
ISE® PRIVATE DINNER
Does the Next Generation of Attacks Validate Your Endpoint Protection, your SOC and Justify a Hunt Team?
Dr. Yonesy F. Nuñez
SVP / Information Security Leader - Wholesale & International
Wells Fargo
Biography
A wave of next generation attacks that are ‘advanced’ and ‘unique’ has hit. Your Ops team is commissioned to keep protections in place, operational and up-to-date, and along comes the next generation of endpoint protection. As endpoints continue to be the entry point for many largescale attacks, it is imperative that security teams take preemptive measures to identify and monitor potential blind spots as early in the attack life cycle as possible. Your SOC is already overwhelmed and anxious of missing never-before-seen attacks. You are now asked to build a “hunt team” when hunters are scarce or unqualified.
Join us in a conversation about what has changed from the attackers’ and the defenders’ points of view, its impact on the SOC, implications for hunt teams and endpoint protection.