Archived Events 2019

ISSA-LA Summit XI
Paying It Forward: Cultivating a New Cybersecurity Workforce

May 17, 2019
11:50am - 12:40pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Antova_Galina Galina Antova
Co-Founder
Claroty
Merritt_Marian Marian Merritt
Lead for Industry Engagement
National Initiative for Cybersecurity Education (NICE)
Biography
Nather_Wendy Wendy Nather
Head, Advisory CISOs for Duo Security
Cisco
Biography
Steffens_Jennifer

Jennifer Sunshine Steffens
CEO
IOActive
Biography

Women and minorities constitute half of technology users, making it only natural for current cybersecurity professionals to look to them as the next generation to carry the torch. Not only is it important to have a cybersecurity workforce that reflects the diversity of its tech users, but also it is a necessity to pursue at a time when both the growth and the talent shortage of the industry are at an all-time high. In order to obtain and mentor this next generation of skilled, ambitious young people, we must put in the work and pass on what we have learned to them. Join our conversation as our panel of leading security executives discuss how to develop and cultivate this next generation workforce and how to locate and inspire them. They will also share their personal success stories and insights on how to make new connections as well as tips for expanding your professional network.

ISSA-LA Summit XI
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

May 17, 2019
2:30pm - 3:20pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
More information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® Central Executive Forum and Awards 2019

The ISE® Central Executive Forum and Awards 2019 was held May 15, 2019 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® CENTRAL PRIVATE WELCOME DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

May 14, 2019
5:30pm - 8:30pm
Chamberlain's Steak and Chop House
5330 Belt Line Rd
Dallas, TX 75254
mills_carrie

Andrew Stokes
Assistant Director and Information Security Officer
Texas A&M University
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 9, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7
<
Ed Amoroso

Manish Khera
Associate Partner - Cyber Security Incident
Response and Investigations Leader
EY - Ernst & Young Global Limited
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 7, 2019
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Chuck Markarian

Chuck Markarian
CISO
PACCAR
ISE® West Executive of the Year Award Winner 2018
ISE® West People's Choice Award Winner 2018

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

2019 Charlotte-Metro ISSA Summit
From Coder to CISO, Developer to Director: How to Advance in Cybersecurity

May 2, 2019
1:15pm - 2:15pm
Charlotte Convention Center
501 S College Street
East Wing
Charlotte, NC 28202
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Robert Allen

Robert Allen
Senior Vice President, Chief Information Security Officer
Brighthouse Financial

James Hillier

James Hillier
Associate CIO & CISO
Central Piedmont Community College
Biography

Jim Nelms

Jim Nelms
Chief Information Security Officer
LabCorp

The cybersecurity industry is in desperate need of people with the skills and willingness to work in the trenches. Engineers, coders, analysts, developers, and others are crucial for any cybersecurity platform to succeed and flourish, but once security professionals find themselves in these positions, it can be hard for them to advance further up the ladder. It’s not a question of what position they would choose to advance to, but rather how they will advance into management and C-level roles. Success seems elusive only because it is rarely clear-cut, taking many forms and leading you down paths you don’t expect. That doesn’t mean you have to traverse the path alone, without any guidance to light your way, or stay stuck where you are. Join our conversation as leading security professionals discuss their insights, perspectives, and career experiences, exploring how they obtained their current positions and what advice they can give fellow security professionals about growing within the industry.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Vikrant Arora

Vikrant Arora
Chief Information Security Officer
Hospital for Special Surgery
ISE® North America Executive Award Finalist 2014 - Health Care Category
ISE® Northeast Executive of the Year Award Winner 2016
ISE® North America Executive Award Winner 2016 - Health Care Category

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 24, 2019
5:30pm - 8:30pm
St. Elmo Steak House
127 S. Illinois St.
Indianapolis, IN 46225
wilcox_dustin

Dustin Wilcox
Vice President and Chief Information Security Officer
Anthem, Inc.
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 23, 2019
5:30pm - 8:30pm
The Capital Grille
444 Brickell Avenue
Miami, FL 33131

Connie Barrera
Corporate Director, Chief Information Security Officer
Jackson Health System
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

April 17, 2019
5:30pm - 8:30pm
Morton's The Steakhouse - Downtown Houston
1001 McKinney St
Houston, TX 77002
Marc Crudgington

Marc Crudgington
Chief Information Security Officer,
SVP, Information Security
Woodforest National Bank
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 10, 2019
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
4322 W Boy Scout Blvd.
Tampa, FL 33607
Ed Amoroso

Ennis Alvarez
Vice President of IT Security & Infrastructure
Rooms To Go
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 9, 2019
5:30pm - 8:30pm
Murray’s
26 South 6th Street
Minneapolis, MN 55402

John Valente
Chief Information Security Officer
The 3M Company
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

April 4, 2019
5:30pm - 8:30pm
One Market
1 Market Street
San Francisco, CA 94105
Selim Aissi

Selim Aissi
Senior Vice President & Chief Security Officer
Ellie Mae
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

March 28, 2019
5:30pm - 8:30pm
J&G Steakhouse
The Phoenician Scottsdale
6000 E Camelback Rd
Scottsdale, AZ 85251
Marion_Shaun

Shaun Marion
Vice President and Chief Security Officer
Honeywell International
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

March 27, 2019
5:30pm - 7:00pm
Smyrna Goodwill
3205 South Cobb Dr SE
Smyrna, GA 30080
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 21, 2019
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Khalfan_Shaun

Shaun Khalfan
VP, Information Security
Freddie Mac
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

March 20, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Hara_Moriah

Moriah Hara
CISO Board Advisor
Clearsky Fund-and Glilot Capital
ISE® Northeast Executive Award Finalist 2017
ISE® North America Executive: Commercial Award Finalist 2017

Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 19, 2019
5:30pm - 8:30pm
American Cut Steakhouse
3035 Peachtree Rd NE #140
Atlanta, GA 30305

Keyaan Williams
CEO
Cyber Leadership and Strategy Solutions, LLC
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® VIP Signature Luncheon with Cisco at RSA® 2019
The Threat Is Real: Pushing the Boundaries of Threat Intelligence

cisco


March 7, 2019
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

As the digital world continues to expand at an alarming rate, attackers gain more opportunities and resources to effectively breach defenses. To protect against these threats, enterprises must go beyond tracking and detection to explore and advance today’s security technologies, so they can defend against tomorrow’s exploits. Security teams need threat intelligence and detection technologies to inform and defend their customer base from the latest malware and ransomware attacks before these threats blindside them. To do so requires security teams to have threat visibility in their email, networks, cloud, endpoints, and everything in between, allowing them to have a proactive approach and superior protection. However, security teams are already understaffed, struggling with the lack of experienced talent within the industry. By focusing on the right technology and processes, executives can alleviate this pain point and harness their teams to perform effectively, even as the search for people with desired skillsets continues. Join our conversation as we discuss comprehensive intelligence against the latest threats, innovative detection technologies, and how security executives can use them both to bolster their current teams and locate the right talent to fill the gaps.

ISE® VIP Reception with Digital Guardian at RSA® 2019
A 1-2 Punch: Data Loss Prevention and Endpoint Detection & Response

digital guardian


March 6, 2019
6:30 pm - 8:30 pm
Gallery 16
501 3rd Street
San Francisco, CA 94107
More information

Your business relies on data to grow; you need a way to understand all the risks targeting that data to support your security teams and senior leadership into making informed business decisions. Only Digital Guardian delivers a 1-2 punch of consolidated Data Loss Prevention and Endpoint Detection & Response so your security team can find, understand, and protect your enterprise’s data without excess cost or complexity. Your enterprise will be able to target and resolve security alerts that matter in real time, all with the aid of security analyst-approved workspaces, making next steps easier for your security team to determine. Join our conversation as we discuss how you and your security team can employ a purpose-built, SaaS platform that focuses on mitigating risks to your sensitive data and eliminates the need to waste time worrying about the infrastructure.

ISE® VIP Signature Luncheon with Respond Software at RSA® 2019
Which of the Status Quos in Security Needs to Be Broken?

respond software


March 6, 2019
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Cybersecurity did not always have a status quo. IT professionals merely created best practices and shared them with the best of intentions. Because these practices and procedures worked at the time, we’ve been clinging to them ever since, even though they often create operational roadblocks and headaches and don’t always keep businesses safe. Why are common procedures and old beliefs about security lingering even though they are clearly outdated or outright wrong to continue? Join our conversation as we discuss security practices involving business, organization, operations, technology, and marketing, answering the questions of why certain activities persist despite being past their due date and how we can overcome the status quo.

T.E.N. & ISE® Sales and Marketing Breakfast at RSA® 2019
Why Relationships Matter: Best Practices for Connecting with Information Security Executives

ten


March 6, 2019
7:45 am – 10:00 am
Oren’s Hummus San Francisco
71 3rd St, San Francisco, CA 94103
More information

In today’s cybersecurity-centric world, it’s no secret that CISOs are some of the busiest, most in-demand executives of all time, making appeals to the board for support and leading their teams through complex rollouts and management of their security programs. As well-funded cybersecurity programs have become a competitive and regulatory advantage in this era of security breaches and technological advancement, CISOs need to find the best security solutions that will help solve their enterprise’s unique challenges. In truth, most have little time to meet with vendors. Additionally, flashy emails, unsolicited cold calls, and other antiquated marketing tactics do not impress them and rarely lead to follow-up communications or meaningful interactions with vendors, let alone a sale. Most vendors believe that making the perfect pitch at the perfect time is the key to making a connection with CISOs, but the truth is much simpler yet also more complex: CISOs desire relationships with people they can trust. But how do you start building those relationships along with the trust that’s necessary to go along with them? What’s the best way for making introductions as timely and ethically as possible while also making the best first impression and to fast track your deal?

Find the answers to these important questions and more at T.E.N.’s ISE® Sales and Marketing Breakfast during the 2019 RSA® Conference. Our panel of executive thought leaders will share their real-world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation’s top IT and security executives.

ISE® VIP Reception with Agari at RSA® 2019
Trust Your Inbox Again

agari


March 5, 2019
7:00 pm - 10:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Whether it is spear phishing attempts, business email compromise scams, account takeover-based attacks, or some other scheme capitalizing on the latest news headline or life event, fraudsters are here to stay—and they’re armed to the teeth with technology stacks familiar to any modern enterprise. As it stands, the average cost of a successful email attack can run your organization $1.6 million and up. If it leads to a data breach, you’re facing an average of $7.9 million in costs, according to Forbes—not to mention dilution of your brand, possible fines, and even criminal prosecution. To win the battle, we need to know our enemy. Instead of focusing on “the bad” by searching the entire threat surface of an organization to react to an attack in progress, it is important to begin understanding “the good” by looking at actual sender identity and defining trusted communications. By focusing on "the good" in real communications, it's possible to eliminate "the bad," even if the attack has never been seen before. Join us for an evening of connections and networking with your peers while we discuss the next generation of email security and regaining the confidence to open, click, and trust everything in your inbox.

ISE® VIP Signature Luncheon with ServiceNow at RSA® 2019
Can Connecting IT, Security and Risk Enable a Best-in-Class Security and Integrated Risk Program?

servicenow


March 5, 2019
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

The breaches of the past few years continue to show us that organizations are overwhelmed and struggling with patching software vulnerabilities. But what if security teams were enabled to properly pinpoint the vulnerabilities that represent the most risk and align these risks with overall enterprise risk? Join our conversation as we discuss how organizations are connecting IT, security and risk through continuous monitoring for risks due to software vulnerabilities, resulting in dramatic improvements in both their security posture and integrated risk program.

ISE® VIP Private Dinner with Demisto and Netskope at RSA® 2019
The Security Stack of the Future: From Ad-Hoc to Orchestrated

demisto
netskope


March 4, 2019
6:30 pm – 9:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
More information

Current efforts to address the challenges of cybersecurity have involved arbitrary approaches with bolt-on technologies integrated through a best-effort approach. This piecemeal approach has both overwhelmed and exhausted security teams to the point where tools and alerts have just become noise. As businesses continue to embrace the cloud, security teams need to respond in a more agile manner. Join our conversation as we discuss balancing the needs of the business with an acceptable level of risk and establishing a more modern approach to provide visibility and security up and down the stack.

ISE® VIP Welcome Reception with Shape Security at RSA® 2019
Security Perfected for the Fortune 500, Now Available for All

shape security


March 3, 2019
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
More information

Shape uses artificial intelligence to fight artificial users for some of the worlds largest name brands across every industry. We protect 2 of the top 10 global retailers, 3 of the top 5 global hotel chains, 2 of the top 10 global banks, and 5 of the top 10 global airlines. This technology that has been perfected for the Fortune 500, is now available for all companies, regardless of size or security budget. Join us to learn how Shape can best protect your website and mobile applications from imitation attacks with a solution that makes sense for you.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

February 21, 2019
5:30pm - 8:30pm
Chamberlains
5330 Beltline Road
Dallas, TX 75254
Stroud_Randy

Randy Stroud
Vice President, Information Security, CISO
Hunt Companies
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® Southeast Executive Forum and Awards 2019

The ISE® Southeast Executive Forum and Awards 2019 was held February 6, 2019 at the Westin Peachtree Plaza Downtown in Atlanta, GA. The ISE® Southeast Awards was held in conjunction with a one day Executive Forum which included keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offered the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® SOUTHEAST PRIVATE WELCOME DINNER
The World of Internet-scale Threats

February 5, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
303 Peachtree Center Avenue
Atlanta, GA 30308

ISE® Guest Host:

Kevin Gowen

Kevin Gowen
Chief Information Security Officer
Synovus
ISE® Southeast Executive Award Finalist 2019
Biography

NETSCOUT Executive Speaker:

McNerney_Mike

Mike McNerney
Senior Director, Product Management Threat
NETSCOUT

The complex threat landscape is moving rapidly, expanding its footprint and changing tactics on a global internet scale. Now, even countries are highly targeted by Distributed Denial of Service (DDoS) attack campaigns, which dramatically increased in attack size and scale from 2017 to 2018. Vertical industry targets are also expanding, with government agencies, ecommerce, and mail-order houses experiencing an increase in attacks. With so much at stake, threat intelligence is more important than ever. Join our conversation as we discuss the latest trends and activities from nation-state advanced persistent threat (APT) groups, crimeware operations, and DDoS attack campaigns.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

January 30, 2019
5:30pm - 8:30pm
BLT Steak
The Ritz-Carlton, Charlotte
110 N. College St.
Charlotte, NC 28202
Jim Nelms

Jim Nelms
Chief Information Security Officer
LabCorp

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

January 23, 2019
5:30pm - 8:30pm
Manhatta
28 Liberty Street
New York, NY 10005
Ed Amoroso

Ed Amoroso
Founder and CEO
TAG Cyber LLC
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

January 22, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 W Olive St., Suite 180
Burbank, CA 91505
David Alexander

David Alexander
Chief Information Security Officer
Los Angeles Department of Water and Power
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

January 17, 2019
5:30pm - 8:30pm
Eddie V's Prime Seafood
4023 Oak Lawn Ave.
Dallas, TX 75219
Eric Fisch

Eric Fisch
Executive Vice President and Information Security Officer
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

Atlanta Girls’ School Winterim 2019
Following Your Passion to Chart a Successful Path in Tech

January 15, 2019
12:00pm - 3:00 pm (2 sessions)
Atlanta Girls’ School
3254 Northside Parkway NW
Atlanta, GA 30327
More Information
Guest Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

While women constitute a minority within the technology industry, we are now seeing improvements at drawing them into the field. For instance, the 2018 (ISC)2 Cybersecurity Workforce Study reports that women now represent 24% of the cybersecurity workforce, compared to past reports of 11%. Additionally, Millennial and Gen Y representation has increased to 35% from less than 20%. Though we’re progressing in making STEAM fields more accessible to women and young people, we still have a long way to go in dismantling the FUD and stereotypes that accompany these industries. The truth is, there’s more to technology than just programming and coding. Employers in these industries desire candidates with skillsets like marketing and business as well as soft skills like teamwork and collaboration—you can even be an entrepreneur! In other words, being tech-savvy isn’t the only path into a tech field; there are, in fact, many paths you can take and various avenues for you to get there. Join Marci McCarthy, CEO and President of T.E.N. and member of the AGS Board of Trustees, as she discusses how women can find success and a future within the tech industry by following their passions, even if said passion isn’t technical in nature.

ISSA Chicago Chapter Meeting
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

January 10, 2019
3:00pm - 5:00 pm
Carlucci Rosemont
6111 North River Road
Rosemont, IL 60018 US
More Information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

January 8, 2019
5:30pm - 8:30pm
The Palm
The Westin Buckhead Atlanta
3391 Peachtree Rd NE
Atlanta, GA 30326

Lonnie Benavides
Vice President, Head of Active Defense
Information, Security & Risk Management
McKesson
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.