Archived Events 2019

ISE® PRIVATE DINNER
The Rise of Global Identity in Digital Transactions

September 19, 2019
5:30pm - 8:30pm
George
111C Queen St. E
Toronto, ON M5C 1S2
Weston_Stephen

Stephen Weston
Vice President, Chief Information Security Officer
Canadian Tire Corporation
Biography

With cloud usage growing and the concern for data security on the rise, regulatory entities around the globe are increasingly introducing and enforcing new legislation that brings greater transparency between the user and end-entity in digital transactions. We have witnessed the stir GDPR has and will continue to cause, especially as more enterprises seek to redefine their compliance to its standards. Then, there is eIDAS, which aims to create a robust European legal environment for secure and trustworthy electronic business processes in the public sector. Meanwhile, PSD2 introduces new business models between banks and third-party service providers, while Germany’s BSI promotes IT security for its federal government as well as for IT manufacturers and commercial providers. While the European Union is leading the charge toward the rise of identity in many instances, this has direct impact on multi-national businesses based in North America. In the United States there are already regulations in place—some industry specific such as PCI DSS and HIPPA Privacy Rules—that organizations must comply with. What responsibilities are North American enterprises expected to uphold of these many regulations, and what are the ramifications of non-compliance? As security and identity take on a more global aspect, it has also become crucial to provide clear indicators—such as verified SSL certificates and universal identity marks in web browsers—to specify trusted communication with verified organizations. Having these indicators be uniform and easy to interpret can reduce or eliminate the chances of transmitting sensitive data through a secure channel to a bad actor. This practice would also make it simpler to follow compliance regulations, no matter their origin. Join our conversation as we discuss how overseas regulations for digital transactions impact businesses in the United States and across North America, what this means for digital identity security, and how we can capitalize on these regulations to build more trusted relationships with users and customers.

ISE® PRIVATE DINNER EVENING PRIOR TO INFOSEC NASHVILLE
Security Maturity: Mapping the Road to Resilience

September 12, 2019
5:30pm - 8:30pm
Cocktail Hour
Cumberland Bar
JW Marriott Nashville
201 8th Ave S
Nashville, TN 37203

Dinner
Bourbon Steak
JW Marriott Nashville
201 8th Ave S, 34th floor
Nashville, TN 37203
Maxwell_Dirk

Dirk Maxwell
Chief Information Security Officer
LKQ Corporation
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
The Rise of Global Identity in Digital Transactions

September 11, 2019
5:30pm - 8:30pm
Seven Steakhouse
700 Hennepin Ave
Minneapolis, MN 55403

William Scandrett
VP, CISO
Allina Health
Biography

With cloud usage growing and the concern for data security on the rise, regulatory entities around the globe are increasingly introducing and enforcing new legislation that brings greater transparency between the user and end-entity in digital transactions. We have witnessed the stir GDPR has and will continue to cause, especially as more enterprises seek to redefine their compliance to its standards. Then, there is eIDAS, which aims to create a robust European legal environment for secure and trustworthy electronic business processes in the public sector. Meanwhile, PSD2 introduces new business models between banks and third-party service providers, while Germany’s BSI promotes IT security for its federal government as well as for IT manufacturers and commercial providers. While the European Union is leading the charge toward the rise of identity in many instances, this has direct impact on multi-national businesses based in North America. In the United States there are already regulations in place—some industry specific such as PCI DSS and HIPPA Privacy Rules—that organizations must comply with. What responsibilities are North American enterprises expected to uphold of these many regulations, and what are the ramifications of non-compliance? As security and identity take on a more global aspect, it has also become crucial to provide clear indicators—such as verified SSL certificates and universal identity marks in web browsers—to specify trusted communication with verified organizations. Having these indicators be uniform and easy to interpret can reduce or eliminate the chances of transmitting sensitive data through a secure channel to a bad actor. This practice would also make it simpler to follow compliance regulations, no matter their origin. Join our conversation as we discuss how overseas regulations for digital transactions impact businesses in the United States and across North America, what this means for digital identity security, and how we can capitalize on these regulations to build more trusted relationships with users and customers.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

September 10, 2019
5:30pm - 8:30pm
Ocean Prime
124 S 15th St.
Philadelphia, PA 19102

Dave Snyder
Chief Information Security Officer
Independence Blue Cross
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

August 27, 2019
5:30pm - 8:30pm
Little Alley Steak – Buckhead
3500 Lenox Rd NE Suite 100
Atlanta, GA 30326
Kevin Morrison

Kevin Morrison
Chief Information Security Officer
Pulte Group, Inc.
ISE® Southeast People’s Choice Award Winner 2015
Biography

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2019 was held August 22, 2019 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® WEST PRIVATE WELCOME DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

August 21, 2019
5:30pm - 8:30pm
Harris’ Steakhouse
2100 Van Ness Avenue
San Francisco, CA 94109
Kannan Perumal

Kannan Perumal
CISO
Applied Materials
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

August 15, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7

Chad Marson
Director Information Security – Capital Markets,
International, Commercial Payments & Wealth
CIBC
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® VIP PROGRAM - THE SUPERCAR DRIVING EXPERIENCE
AppSec That Won’t Slow You Down

August 7, 2019
5:30pm - 8:30pm
Las Vegas Motor Speedway
Exotics Racing Racetrack
7065 Speedway Blvd
Las Vegas, NV 89115

Saltworks Security Executive Speaker:

hurst_dennis

Dennis Hurst
Founder
Saltworks Security

ISE® VIP Hosts:

Michael Blache

Michael Blache
CISO
TaxSlayer LLC

Duane Dobbins

Duane Dobbins
Information Security Officer
New York Life Insurance Company
Biography

Max Garcia

Max Garcia
Chief Information Security Officer
Prime Revenue
Biography

gott_pamela

Pamela Gott
Vice President, Global Cyber Security & Fraud
First Data Corporation
Biography

Kevin Heinemen

Kevin Heineman
VP, Application Security
Global Payments Inc.

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Today’s market demands will not let software development wait for security to catch up. Even if you have the right team, expertise, tools, and training in place to achieve your business goals, it won’t matter if your approach to application security is outdated. Like an airbag that is installed after a car is driven off the lot, AppSec cannot wait to be applied at later stages. Instead, security teams will achieve the most out of AppSec if they focus on weaving customized security into the DNA of each unique software development lifecycle. In order to achieve this, they will need to have an AppSec program in place that is ongoing, where DevOps teams can maintain security and necessary technologies can continue to implement it moving forward—all at optimal speeds. Join our conversation as we discuss how companies can create and manage AppSec programs that run as predictably, effectively, and measurably as a well-oiled machine.

Transportation will be provided to Las Vegas Motor Speedway from the Mandalay Bay Hotel starting at 4:30 p.m. Please meet at the Mandalay Bay Tour Bus Lobby and shuttle bus service will be provided to the event. The last shuttle bus will leave Mandalay Bay at 5:20 p.m.

ISE® VIP PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

August 6, 2019
5:30pm - 8:30pm
Charlie Palmer Steak at Four Seasons
3960 S Las Vegas Blvd
Las Vegas, NV 89119
David Scott

David Scott
Associate Director, Cybersecurity
Medication Management Solutions
BD - Medical Segment
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

2019 Community College Cyber Summit
Becoming a Cybersecurity Enabler: How Community Colleges Can Bridge the Diversity and Workforce Gap

August 1, 2019
9:00am - 9:30am
Bossier Parish Community College
6220 E Texas St
Bossier City, LA 71111
Watch Marci's Keynote

Keynote Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Leaders in the cybersecurity industry recognize that there is a lack of women and diversity among their teams. Even though women and minorities nearly comprise half of the general workforce, they only make up a small portion of cybersecurity professionals despite millions of jobs going unfilled and rising cyberattacks. In the past, employers have maintained a structured mindset about candidates’ qualifications to include four-year or advanced degrees, proven industry experience and like-minded thinking. However, due to the shortage of qualified cybersecurity talent, we are experiencing a paradigm shift in how we view these hiring requirements. We now need candidates who are gamechangers, who can bring much needed soft skills, passions and differing opinions that can take team thinking to the next level. With their various perspectives, women and minorities must be encouraged to enter the field as early as possible, but it’s also crucial that they maintain a passion to learn and succeed by cultivating the necessary skills to stay there. Fortunately, they can obtain technical skills and certifications by pursuing specialized training, work-study programs and apprenticeships, such as those offered by cyber boot camps, technical schools and community colleges. Currently, though, community colleges and similar establishments experience challenges with marketing themselves as security partners who enable cybersecurity professional development. To connect upcoming, diverse talent with employers who need them, community colleges can adapt and enhance the way they interact with both groups. Join us as we share our insights about the challenges community colleges face in becoming cybersecurity enablers, facilitating job readiness and contributing to solve the industry’s diversity and workforce shortage.

ISE® PRIVATE DINNER
How Leveraging East-West Movement Can Turn the Tide Against Cyber Adversaries

July 30, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219

Digital Hands' Executive Speaker:

Myrna Soto

Myrna Soto
COO, Digital Hands
Former Global CISO, Comcast Corp.
Current Active Board Member, CMS Energy, Spirit Airlines and Popular Inc.
ISE® Northeast Executive Award Winner 2013
ISE® North America Commercial Executive Award Finalist 2013
ISE® North America Commercial Executive Award Finalist 2012
ISE® Northeast Executive Award Finalist 2012

Biography

ISE® VIP Host:

Elliott Franklin

Elliott Franklin
Director of IT Governance & Security
Loews Hotels

Traditionally, enterprises and inexperienced MSSPs have closely monitored north-south movement for cyber threats, but east-west movement—otherwise known as lateral movement—has been neglected, leading to a host of blind spots through which an adversary can maneuver. With increasing judgment falling on security teams who cannot keep intrusions from turning into data loss, lateral movement can no longer be left unmonitored and undefended. Fortunately, there are many ways security teams can shift direction on the network compass and leverage critical controls to detect and stop adversaries, but none of them are easy. Any decently sized network very quickly becomes a management quagmire due to the sheer amount of data (events, threat intel, correlation, etc.) that have to be ingested and analyzed. Having the right security technology is only a portion of the battle; strong security posture comes from having people and processes in place to adequately monitor, and manage, and analyze systems, and that includes choosing the right MSSP out of a whirlpool of possibilities. Join our conversation as we discuss how you can turn the tide against cyber adversaries by defending against malicious lateral movement, pinpointing its risks and preventing APT-level intrusions from spreading across your network.

ISE® PRIVATE DINNER
Digitization and the Path to Business Transformation Via Total Data Intelligence

July 25, 2019
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
1960-A Chain Bridge Rd.
McLean, VA 22102
Vikas Mahajan

Vikas Mahajan
Sr. Director, Information Security Operations
The American Red Cross
Biography

Because of digitization, the amount of data existing in the world has exploded, with 2.5 quintillion bytes created every day according to Forbes. With new data regulations emerging globally as a result, data privacy and cybersecurity have become top concerns for the Chief Data Officer and CISO alike. Many security professionals report that they do not currently have access to company data necessary to perform their jobs, leaving us to answer a pivotal question: How can we drive pervasive data intelligence in the organization, while reducing risks and protecting customer data privacy? Digitization only complicates this question with security leaders considering how the large movement of data will change the needs of their security program and impact strategies for protecting the data an organization collects. The majority of IT decision-makers agree they want pervasive data intelligence in their organization, but there are bottlenecks on the path to achieving 100% real-time intelligent answers, such as compliance standards, regulation requirements and risk concerns to both business and security. Join our conversation as we discuss how digitization has affected the path to business transformation and data security, requiring new approaches to acquire pervasive data intelligence that is scalable, frictionless and omnipresent.

New York Enterprise Information Security Meetup: July Edition
Fireside Chat with Marci McCarthy

July 23, 2019
6:00pm - 8:00pm
Main Floor
245 Lexington Ave
New York, NY 10016
More Information

Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

NY Information Security Meetup (NYIS) is about advancing information security. Come join us to learn the latest information on enterprise security trends in Cyber Security, Mobile computing, Networks, Endpoint, Governance and Compliance. The meetings will feature speakers, emerging vendor demos in the security space, panel discussion, workshops, and networking.

We are in of an era where Cyber Security is taking front page and enterprises are embracing new technologies to defend against rising threats. Come and join us to mingle, learn, and prosper.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

July 17, 2019
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
John Graham

Kirsten Davies
SVP & Chief Information Security Officer
The Estée Lauder Companies
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

July 16, 2019
5:30pm - 8:30pm
Barclay Prime
237 S 18th St.
Philadelphia, PA 19103
Mark Risoldi

Mark J. Risoldi
Executive Director, Business Information Risk Management & Security
Merck & Co., Inc.
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

June 25, 2019
5:30pm - 8:30pm
Perry's Steakhouse & Grille - Austin Downtown
114 W. 7th Street #110
Austin, TX 78701
Allgeier_Michael

Michael Allgeier
Director, Critical Infrastructure Security
ERCOT
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

WEBINAR: The Economic and Trade Mission at the Embassy of Israel
Why Relationships Matter: Bridging the Gap Between U.S. CISOs and Israeli Security Vendors

June 17, 2019
9:00am EST – 10:00am EST
4:00pm IDT – 5:00pm IDT
Download the Presentation
and Watch the Webinar



Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

In today’s cybersecurity-centric world, it’s no secret that U.S. CISOs are some of the busiest, most in-demand executives of all time, making appeals to the board for support and leading their teams through complex rollouts and management of their security programs. As well-funded cybersecurity programs have become a competitive and regulatory advantage in this era of security breaches and technological advancement, U.S. CISOs need to find the best security solutions that will help solve their enterprise’s unique challenges—and the best solutions may be beyond their borders. However, most have little time to meet with U.S.-based vendors, not to mention Israeli providers. While the Israeli cybersecurity industry is world famous and enjoys an excellent reputation in the U.S., Israeli cyber vendors also face specific challenges to succeed in the U.S. market:

  • Israeli cyber startups’ competitive advantage is their ability to address a specific pain point using innovative solutions that other cyber vendors frequently do not possess. How can these Israeli cyber firms identify CISOs who face the specific challenge that the Israeli firm addresses?
  • As one U.S. CISO told us, the best place to find cybersecurity teams from major organizations is not in the Exhibit Hall at large cyber events like RSA, but at off-site gatherings. How can Israeli cyber vendors get “in the room” where relationships are built?
  • Cyber vendors everywhere—not only in Israel—need to understand that antiquated marketing tactics do not impress U.S. CISOs and rarely lead to follow-up communications or meaningful interactions with vendors, let alone a sale. U.S. CISOs have become increasingly willing to simply end relationships with vendors of any nationality who push their products and overstep boundaries. How can Israeli cyber vendors find the right balance between pushing too hard and not being aggressive enough?
  • When working with the cybersecurity team of a Fortune 500 company, what is a sales cycle typically like? How can Israeli vendors work with the client’s team to ensure a more effective and productive sales process?

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

June 11, 2019
5:30pm - 8:30pm
The Palm
1750 Tysons Blvd
McLean, VA 22102
Frank Aiello

Frank Aiello
VP, CISO
Maximus
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016

Biography

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

Rocky Mountain Information Security Conference 2019
Empower Cyber Security Leadership Through Emotional Intelligence

June 6, 2019
11:15am - 12:15pm
Colorado Convention Center
700 14th St
Denver, CO 80202
More Information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Research has clearly shown that a person can have the best training in the world, a sharp, analytical mind and an endless supply of good ideas, but these alone will not make them a great leader. While these factors are all important, to be an effective leader, one must also possess a high degree of Emotional Intelligence (EI). This is especially true for information and cybersecurity professionals. Harnessing Emotional Intelligence ensures effective communication between InfoSec executives and their security teams as well as communication between security executives, stakeholders, teammates, lines of business leaders, customers, and board members. Strong working relationships and interpersonal skills are the keys to success in every area of human activity, especially for a cybersecurity professional looking to enhance their leadership skills and bring out the best in their teams. Join Marci McCarthy as she discusses how you can best utilize Emotional Intelligence to get ahead, learn how to be authentic to yourself, how to shape your conversations as a thought leader, and how to improve confidence and professionalism.

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

May 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Raymond Lipps

Raymond Lipps
Executive Director, Chief Information Security Officer
Celgene Corporation
Biography

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

ISSA-LA Summit XI
Paying It Forward: Cultivating a New Cybersecurity Workforce

May 17, 2019
11:50am - 12:40pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Antova_Galina Galina Antova
Co-Founder
Claroty
Merritt_Marian Marian Merritt
Lead for Industry Engagement
National Initiative for Cybersecurity Education (NICE)
Biography
Nather_Wendy Wendy Nather
Head, Advisory CISOs for Duo Security
Cisco
Biography
Steffens_Jennifer

Jennifer Sunshine Steffens
CEO
IOActive
Biography

Women and minorities constitute half of technology users, making it only natural for current cybersecurity professionals to look to them as the next generation to carry the torch. Not only is it important to have a cybersecurity workforce that reflects the diversity of its tech users, but also it is a necessity to pursue at a time when both the growth and the talent shortage of the industry are at an all-time high. In order to obtain and mentor this next generation of skilled, ambitious young people, we must put in the work and pass on what we have learned to them. Join our conversation as our panel of leading security executives discuss how to develop and cultivate this next generation workforce and how to locate and inspire them. They will also share their personal success stories and insights on how to make new connections as well as tips for expanding your professional network.

ISSA-LA Summit XI
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

May 17, 2019
2:30pm - 3:20pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
More information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® Central Executive Forum and Awards 2019

The ISE® Central Executive Forum and Awards 2019 was held May 15, 2019 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® CENTRAL PRIVATE WELCOME DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

May 14, 2019
5:30pm - 8:30pm
Chamberlain's Steak and Chop House
5330 Belt Line Rd
Dallas, TX 75254
mills_carrie

Andrew Stokes
Assistant Director and Information Security Officer
Texas A&M University
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 9, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7
<
Ed Amoroso

Manish Khera
Associate Partner - Cyber Security Incident
Response and Investigations Leader
EY - Ernst & Young Global Limited
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 7, 2019
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Chuck Markarian

Chuck Markarian
CISO
PACCAR
ISE® West Executive of the Year Award Winner 2018
ISE® West People's Choice Award Winner 2018

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

2019 Charlotte-Metro ISSA Summit
From Coder to CISO, Developer to Director: How to Advance in Cybersecurity

May 2, 2019
1:15pm - 2:15pm
Charlotte Convention Center
501 S College Street
East Wing
Charlotte, NC 28202
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Robert Allen

Robert Allen
Senior Vice President, Chief Information Security Officer
Brighthouse Financial

James Hillier

James Hillier
Associate CIO & CISO
Central Piedmont Community College
Biography

Jim Nelms

Jim Nelms
Chief Information Security Officer
LabCorp

The cybersecurity industry is in desperate need of people with the skills and willingness to work in the trenches. Engineers, coders, analysts, developers, and others are crucial for any cybersecurity platform to succeed and flourish, but once security professionals find themselves in these positions, it can be hard for them to advance further up the ladder. It’s not a question of what position they would choose to advance to, but rather how they will advance into management and C-level roles. Success seems elusive only because it is rarely clear-cut, taking many forms and leading you down paths you don’t expect. That doesn’t mean you have to traverse the path alone, without any guidance to light your way, or stay stuck where you are. Join our conversation as leading security professionals discuss their insights, perspectives, and career experiences, exploring how they obtained their current positions and what advice they can give fellow security professionals about growing within the industry.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Vikrant Arora

Vikrant Arora
Chief Information Security Officer
Hospital for Special Surgery
ISE® North America Executive Award Finalist 2014 - Health Care Category
ISE® Northeast Executive of the Year Award Winner 2016
ISE® North America Executive Award Winner 2016 - Health Care Category

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 24, 2019
5:30pm - 8:30pm
St. Elmo Steak House
127 S. Illinois St.
Indianapolis, IN 46225
wilcox_dustin

Dustin Wilcox
Vice President and Chief Information Security Officer
Anthem, Inc.
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 23, 2019
5:30pm - 8:30pm
The Capital Grille
444 Brickell Avenue
Miami, FL 33131

Connie Barrera
Corporate Director, Chief Information Security Officer
Jackson Health System
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

April 17, 2019
5:30pm - 8:30pm
Morton's The Steakhouse - Downtown Houston
1001 McKinney St
Houston, TX 77002
Marc Crudgington

Marc Crudgington
Chief Information Security Officer,
SVP, Information Security
Woodforest National Bank
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 10, 2019
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
4322 W Boy Scout Blvd.
Tampa, FL 33607
Ed Amoroso

Ennis Alvarez
Vice President of IT Security & Infrastructure
Rooms To Go
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 9, 2019
5:30pm - 8:30pm
Murray’s
26 South 6th Street
Minneapolis, MN 55402

John Valente
Chief Information Security Officer
The 3M Company
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

April 4, 2019
5:30pm - 8:30pm
One Market
1 Market Street
San Francisco, CA 94105
Selim Aissi

Selim Aissi
Senior Vice President & Chief Security Officer
Ellie Mae
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

March 28, 2019
5:30pm - 8:30pm
J&G Steakhouse
The Phoenician Scottsdale
6000 E Camelback Rd
Scottsdale, AZ 85251
Marion_Shaun

Shaun Marion
Vice President and Chief Security Officer
Honeywell International
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

March 27, 2019
5:30pm - 7:00pm
Smyrna Goodwill
3205 South Cobb Dr SE
Smyrna, GA 30080
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 21, 2019
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Khalfan_Shaun

Shaun Khalfan
VP, Information Security
Freddie Mac
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

March 20, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Hara_Moriah

Moriah Hara
CISO Board Advisor
Clearsky Fund-and Glilot Capital
ISE® Northeast Executive Award Finalist 2017
ISE® North America Executive: Commercial Award Finalist 2017

Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 19, 2019
5:30pm - 8:30pm
American Cut Steakhouse
3035 Peachtree Rd NE #140
Atlanta, GA 30305

Keyaan Williams
CEO
Cyber Leadership and Strategy Solutions, LLC
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® VIP Signature Luncheon with Cisco at RSA® 2019
The Threat Is Real: Pushing the Boundaries of Threat Intelligence

cisco


March 7, 2019
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

As the digital world continues to expand at an alarming rate, attackers gain more opportunities and resources to effectively breach defenses. To protect against these threats, enterprises must go beyond tracking and detection to explore and advance today’s security technologies, so they can defend against tomorrow’s exploits. Security teams need threat intelligence and detection technologies to inform and defend their customer base from the latest malware and ransomware attacks before these threats blindside them. To do so requires security teams to have threat visibility in their email, networks, cloud, endpoints, and everything in between, allowing them to have a proactive approach and superior protection. However, security teams are already understaffed, struggling with the lack of experienced talent within the industry. By focusing on the right technology and processes, executives can alleviate this pain point and harness their teams to perform effectively, even as the search for people with desired skillsets continues. Join our conversation as we discuss comprehensive intelligence against the latest threats, innovative detection technologies, and how security executives can use them both to bolster their current teams and locate the right talent to fill the gaps.

ISE® VIP Reception with Digital Guardian at RSA® 2019
A 1-2 Punch: Data Loss Prevention and Endpoint Detection & Response

digital guardian


March 6, 2019
6:30 pm - 8:30 pm
Gallery 16
501 3rd Street
San Francisco, CA 94107
More information

Your business relies on data to grow; you need a way to understand all the risks targeting that data to support your security teams and senior leadership into making informed business decisions. Only Digital Guardian delivers a 1-2 punch of consolidated Data Loss Prevention and Endpoint Detection & Response so your security team can find, understand, and protect your enterprise’s data without excess cost or complexity. Your enterprise will be able to target and resolve security alerts that matter in real time, all with the aid of security analyst-approved workspaces, making next steps easier for your security team to determine. Join our conversation as we discuss how you and your security team can employ a purpose-built, SaaS platform that focuses on mitigating risks to your sensitive data and eliminates the need to waste time worrying about the infrastructure.

ISE® VIP Signature Luncheon with Respond Software at RSA® 2019
Which of the Status Quos in Security Needs to Be Broken?

respond software


March 6, 2019
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Cybersecurity did not always have a status quo. IT professionals merely created best practices and shared them with the best of intentions. Because these practices and procedures worked at the time, we’ve been clinging to them ever since, even though they often create operational roadblocks and headaches and don’t always keep businesses safe. Why are common procedures and old beliefs about security lingering even though they are clearly outdated or outright wrong to continue? Join our conversation as we discuss security practices involving business, organization, operations, technology, and marketing, answering the questions of why certain activities persist despite being past their due date and how we can overcome the status quo.

T.E.N. & ISE® Sales and Marketing Breakfast at RSA® 2019
Why Relationships Matter: Best Practices for Connecting with Information Security Executives

ten


March 6, 2019
7:45 am – 10:00 am
Oren’s Hummus San Francisco
71 3rd St, San Francisco, CA 94103
More information

In today’s cybersecurity-centric world, it’s no secret that CISOs are some of the busiest, most in-demand executives of all time, making appeals to the board for support and leading their teams through complex rollouts and management of their security programs. As well-funded cybersecurity programs have become a competitive and regulatory advantage in this era of security breaches and technological advancement, CISOs need to find the best security solutions that will help solve their enterprise’s unique challenges. In truth, most have little time to meet with vendors. Additionally, flashy emails, unsolicited cold calls, and other antiquated marketing tactics do not impress them and rarely lead to follow-up communications or meaningful interactions with vendors, let alone a sale. Most vendors believe that making the perfect pitch at the perfect time is the key to making a connection with CISOs, but the truth is much simpler yet also more complex: CISOs desire relationships with people they can trust. But how do you start building those relationships along with the trust that’s necessary to go along with them? What’s the best way for making introductions as timely and ethically as possible while also making the best first impression and to fast track your deal?

Find the answers to these important questions and more at T.E.N.’s ISE® Sales and Marketing Breakfast during the 2019 RSA® Conference. Our panel of executive thought leaders will share their real-world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation’s top IT and security executives.

ISE® VIP Reception with Agari at RSA® 2019
Trust Your Inbox Again

agari


March 5, 2019
7:00 pm - 10:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Whether it is spear phishing attempts, business email compromise scams, account takeover-based attacks, or some other scheme capitalizing on the latest news headline or life event, fraudsters are here to stay—and they’re armed to the teeth with technology stacks familiar to any modern enterprise. As it stands, the average cost of a successful email attack can run your organization $1.6 million and up. If it leads to a data breach, you’re facing an average of $7.9 million in costs, according to Forbes—not to mention dilution of your brand, possible fines, and even criminal prosecution. To win the battle, we need to know our enemy. Instead of focusing on “the bad” by searching the entire threat surface of an organization to react to an attack in progress, it is important to begin understanding “the good” by looking at actual sender identity and defining trusted communications. By focusing on "the good" in real communications, it's possible to eliminate "the bad," even if the attack has never been seen before. Join us for an evening of connections and networking with your peers while we discuss the next generation of email security and regaining the confidence to open, click, and trust everything in your inbox.

ISE® VIP Signature Luncheon with ServiceNow at RSA® 2019
Can Connecting IT, Security and Risk Enable a Best-in-Class Security and Integrated Risk Program?

servicenow


March 5, 2019
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

The breaches of the past few years continue to show us that organizations are overwhelmed and struggling with patching software vulnerabilities. But what if security teams were enabled to properly pinpoint the vulnerabilities that represent the most risk and align these risks with overall enterprise risk? Join our conversation as we discuss how organizations are connecting IT, security and risk through continuous monitoring for risks due to software vulnerabilities, resulting in dramatic improvements in both their security posture and integrated risk program.

ISE® VIP Private Dinner with Demisto and Netskope at RSA® 2019
The Security Stack of the Future: From Ad-Hoc to Orchestrated

demisto
netskope


March 4, 2019
6:30 pm – 9:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
More information

Current efforts to address the challenges of cybersecurity have involved arbitrary approaches with bolt-on technologies integrated through a best-effort approach. This piecemeal approach has both overwhelmed and exhausted security teams to the point where tools and alerts have just become noise. As businesses continue to embrace the cloud, security teams need to respond in a more agile manner. Join our conversation as we discuss balancing the needs of the business with an acceptable level of risk and establishing a more modern approach to provide visibility and security up and down the stack.

ISE® VIP Welcome Reception with Shape Security at RSA® 2019
Security Perfected for the Fortune 500, Now Available for All

shape security


March 3, 2019
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
More information

Shape uses artificial intelligence to fight artificial users for some of the worlds largest name brands across every industry. We protect 2 of the top 10 global retailers, 3 of the top 5 global hotel chains, 2 of the top 10 global banks, and 5 of the top 10 global airlines. This technology that has been perfected for the Fortune 500, is now available for all companies, regardless of size or security budget. Join us to learn how Shape can best protect your website and mobile applications from imitation attacks with a solution that makes sense for you.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

February 21, 2019
5:30pm - 8:30pm
Chamberlains
5330 Beltline Road
Dallas, TX 75254
Stroud_Randy

Randy Stroud
Vice President, Information Security, CISO
Hunt Companies
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® Southeast Executive Forum and Awards 2019

The ISE® Southeast Executive Forum and Awards 2019 was held February 6, 2019 at the Westin Peachtree Plaza Downtown in Atlanta, GA. The ISE® Southeast Awards was held in conjunction with a one day Executive Forum which included keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offered the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® SOUTHEAST PRIVATE WELCOME DINNER
The World of Internet-scale Threats

February 5, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
303 Peachtree Center Avenue
Atlanta, GA 30308

ISE® Guest Host:

Kevin Gowen

Kevin Gowen
Chief Information Security Officer
Synovus
ISE® Southeast Executive Award Finalist 2019
Biography

NETSCOUT Executive Speaker:

McNerney_Mike

Mike McNerney
Senior Director, Product Management Threat
NETSCOUT

The complex threat landscape is moving rapidly, expanding its footprint and changing tactics on a global internet scale. Now, even countries are highly targeted by Distributed Denial of Service (DDoS) attack campaigns, which dramatically increased in attack size and scale from 2017 to 2018. Vertical industry targets are also expanding, with government agencies, ecommerce, and mail-order houses experiencing an increase in attacks. With so much at stake, threat intelligence is more important than ever. Join our conversation as we discuss the latest trends and activities from nation-state advanced persistent threat (APT) groups, crimeware operations, and DDoS attack campaigns.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

January 30, 2019
5:30pm - 8:30pm
BLT Steak
The Ritz-Carlton, Charlotte
110 N. College St.
Charlotte, NC 28202
Jim Nelms

Jim Nelms
Chief Information Security Officer
LabCorp

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

January 23, 2019
5:30pm - 8:30pm
Manhatta
28 Liberty Street
New York, NY 10005
Ed Amoroso

Ed Amoroso
Founder and CEO
TAG Cyber LLC
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

January 22, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 W Olive St., Suite 180
Burbank, CA 91505
David Alexander

David Alexander
Chief Information Security Officer
Los Angeles Department of Water and Power
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

January 17, 2019
5:30pm - 8:30pm
Eddie V's Prime Seafood
4023 Oak Lawn Ave.
Dallas, TX 75219
Eric Fisch

Eric Fisch
Executive Vice President and Information Security Officer
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

Atlanta Girls’ School Winterim 2019
Following Your Passion to Chart a Successful Path in Tech

January 15, 2019
12:00pm - 3:00 pm (2 sessions)
Atlanta Girls’ School
3254 Northside Parkway NW
Atlanta, GA 30327
More Information
Guest Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

While women constitute a minority within the technology industry, we are now seeing improvements at drawing them into the field. For instance, the 2018 (ISC)2 Cybersecurity Workforce Study reports that women now represent 24% of the cybersecurity workforce, compared to past reports of 11%. Additionally, Millennial and Gen Y representation has increased to 35% from less than 20%. Though we’re progressing in making STEAM fields more accessible to women and young people, we still have a long way to go in dismantling the FUD and stereotypes that accompany these industries. The truth is, there’s more to technology than just programming and coding. Employers in these industries desire candidates with skillsets like marketing and business as well as soft skills like teamwork and collaboration—you can even be an entrepreneur! In other words, being tech-savvy isn’t the only path into a tech field; there are, in fact, many paths you can take and various avenues for you to get there. Join Marci McCarthy, CEO and President of T.E.N. and member of the AGS Board of Trustees, as she discusses how women can find success and a future within the tech industry by following their passions, even if said passion isn’t technical in nature.

ISSA Chicago Chapter Meeting
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

January 10, 2019
3:00pm - 5:00 pm
Carlucci Rosemont
6111 North River Road
Rosemont, IL 60018 US
More Information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

January 8, 2019
5:30pm - 8:30pm
The Palm
The Westin Buckhead Atlanta
3391 Peachtree Rd NE
Atlanta, GA 30326

Lonnie Benavides
Vice President, Head of Active Defense
Information, Security & Risk Management
McKesson
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.