Archived Events 2020

ISE® VIP Signature Luncheon with Secureworks During RSA® Conference 2020
Enabling Modern Security Operations to Scale Using the Power of Data Science and the Cloud

secureworks


February 27, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Modern security operations require a more agile, scalable, and effective model to address the challenges CISOs face with cloud and software-defined IT landscapes and escalating threats. This evolved approach demands a leap forward in capabilities powered by the speed and scale of machine learning, deep learning, and cloud computing. Join our conversation as we discuss how to put the power of data science and the cloud to work by analyzing vendor-inclusive data from the extended IT ecosystem. The insights gained will enable greater visibility, more reliable decision-making, and smarter automation.

ISE® VIP Reception with Digital Guardian During RSA® Conference 2020
Make the Leap to Cloud-Delivered Data Protection (DLP + MDR)

Digital Guardian


February 26, 2020
6:30 pm - 9:30 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
More information

Thanks to the emphasis on data privacy, we are witnessing a resurgence of Data Loss Prevention (DLP) within organizations. A Gartner study predicts that 85% of organizations will have implemented DLP by 2020, up from 50% in 2017. However, traditional DLP solutions are often limited to guarding against insider threats, forcing enterprises to enlist additional tools to defend against the variety of threats challenging security teams. As a result, security stacks become more complicated, signaling that it’s time to make the leap and allow your DLP strategy to advance with the rest of your security. Since cloud-based security continues to increase in demand, DLP also needs to be cloud-delivered and bolstered by Managed Detection and Response (MDR). Cyber attackers are smart; we need to be smarter. Join our conversation as we discuss how you and your security team can reinvent DLP with the cloud and MDR, simplify your security program and mitigate risks to your sensitive data.

ISE® VIP Signature Luncheon with Respond Software During RSA® Conference 2020
It’s the End of the SOC as We Know It (And I Feel Fine)

Respond Software


February 26, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Digital transformation is changing every part of the business, but when it comes to the security operations center (SOC), things haven’t changed much over the past ten years. Enterprises have many disparate security tools in place, and humans are sitting in the SOC, looking at mountains of data and trying to make a decision: Is this alert something to pay attention to, or is it just noise? The constant, overwhelming exposure to security alerts quickly adds up, in time, money and fatigue, leading to analyst burnout and high turnover with few conclusive security results to show for it. Whether your SOC is comprised of your own employees or handled by a service provider, you’ll want to ensure SOC members are happy, performing rewarding and impactful work, rather than getting lost in the trenches where machines and automation can flourish instead. To make a difference, you may have to get rid of filters, prioritize your people and reinvent your data management strategy in ways you never considered doing before. Join our conversation as we discuss how you can modernize your SOC, take advantage of new technology and change the way your SecOps team works.

T.E.N. & ISE® Sales and Marketing Breakfast During RSA® 2020
Standing Out in a Crowded Playing Field by Building Trusted Relationships With Cybersecurity Executives

TEN


February 26, 2020
7:45 am - 10:00 am
Oren’s Hummus San Francisco
71 3rd St
San Francisco, CA 94103
More information

As technology evolves and cyber threats increase, CISOs need security solutions that will make their enterprise programs more efficient and their security teams better equipped to defend them. Every day, security vendors are producing new, innovative solutions, but getting into contact with CISOs can be tricky. The wrong approach can reduce a vendor’s chances to prove themselves, so how can they use their time with a CISO wisely to create the best first impression? Now more than ever, CISOs want to build genuine relationships with vendors who provide solutions specific to their organizational security needs. To stand out from your competitors, you will need to differentiate yourself, both in the language you use to refer to your products and in the way you communicate with security executives—and their teams. No CISO makes product decisions in a vacuum. They rely on their leadership and team members to guide uses of budget, time and productivity. To understand how to sell to a CISO successfully, you need to understand what they want and what their business and security team needs are. For that to happen, you have to build the relationship first. Taking the time to do so will illuminate areas you are likely in the dark about: What is your prospective client’s preferred method of contact, and what is an instant disqualifier? What does their company’s technology products road map look like along with the timeframe to implement these solutions? How can your solution remove complexity to their current security stack instead of adding to it?

ISE® VIP Reception with LookingGlass During RSA® Conference 2020
Obtaining 20/20 Vision: Look Deeper and Act Faster With Smarter Intelligence-Driven Risk Management

LookingGlass


February 25, 2020
7:00 pm - 10:00 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
More information

When your business is at risk, every second matters. The time your security teams spends researching and mitigating known threats is just as important as the time they lose at being unaware of hidden vulnerabilities. In order to obtain 20/20 vision of threats to your business, you will need to enlist an intelligence-driven risk management strategy that is seamless, comprehensive and fully integrated with your security and business needs. Keeping threats at bay on a global scale means meeting them on that scale with global attack surface monitoring, threat modeling, network defense and tailored intelligence-as-a-service. Each security partnership you forge should contribute actively to the defense of your enterprise network and beyond. The right threat intelligence partner will equip your security team with asset visibility and network traffic analysis along with the behavior and signature-based detection required to confidently protect your business. Join us to discuss the need for proactive global threat intelligence; the usefulness of advanced mitigation techniques such as deception and redirection; and how making the right security partnerships can enable us all to see more and act faster.

ISE® VIP Signature Luncheon with Cisco Umbrella During RSA® Conference 2020
Simplified Security Starts in the Cloud

cisco


February 25, 2020
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

The average company uses more than 75 security tools. Firewalls. Web proxies. SIEM. Appliances. Third-party intelligence. The list goes on… What do these tools have in common? They lead to silos and a sea of security alerts for overwhelmed staff who struggle to make sense of it all. With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users a growing target for attacks, it’s likely that your existing security stack is coming up short—and you’re not alone. There is a better way to secure cloud applications and internet access for on-the-go users. Join our conversation as we discuss the resulting security challenges and why many organizations are shifting security services to the cloud to reduce complexity, deliver greater flexibility and enact more consistent enforcement.

ISE® VIP Private Dinner with Cisco During RSA® Conference 2020
Cleaning Out Your Security Closet

cisco


February 24, 2020
6:30 pm – 9:30 pm
Mastro’s Steakhouse
399 Geary St.
San Francisco, CA 94102
More information

Security professionals go hand-in-hand with processes and technology. As security threats evolve and escalate, we tend to accumulate more and more tools and methods until our security stacks become cluttered and too complicated. If Marie Kondo were helping you tidy up, what would you remove from your security portfolio? We all have technologies and processes we cling to, not because we necessarily need them but because they are comfortable and familiar. If we take a step back and look at the bigger picture, we can determine the security solutions and processes we can live without while pinpointing what gaps we still need to fill. Join our conversation as we discuss a Marie Kondo approach to trimming down and cleaning up your security closet while also asking ourselves the inevitable question: does anything really spark joy in cybersecurity?

ISE® VIP Welcome Reception with Ionic Security During RSA® Conference 2020
Say Goodbye to Gridlock: The Shift of Modern Data Protection

Ionic


February 23, 2020
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
More information

All too often, enterprise data security is siloed, but sensitive data is not. Data travels between and resides in applications, data stores, devices and different environments. Every point of access has a context, driven by identity, attributes and complex access policies, which can quickly overwhelm enterprises using disparate solutions and relying on siloes. What results is data security gridlock, which undermines the performance of your business and security team since they cannot scale data protection with the enterprise. For decades, security has focused on securing the gates, moats and fences around where data resides, but that is no longer an effective procedure. Now that location is no longer definitive, we need to go back to the basics and ask a simple question: Why don’t we just start with eliminating gridlock and protecting the data? Join our conversation as we discuss how to seamlessly enable scalable, sustainable and consistent data protection by securing sensitive data from unauthorized access and breaches, wherever it lives or travels.

ISE® PRIVATE DINNER
From Candidate to Expert: Cyber Range Training Across the Entire Employee Lifecycle

February 20, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Cindy Cullen

Cindy Cullen
Director of Information Security
Interpublic Group
Biography

Cyber threats are ever-increasing and aggressive, causing no shortage of trouble for overworked and understaffed security teams. According to Gartner’s 2019 CIO Agenda, 95% of CIOs expect cybersecurity threats to get worse. Enterprises are looking for innovative candidates to join as security professionals, but hiring and training employees can be a challenge in and of itself. Enter cyber ranges, controlled virtual environments where white hats can train extensively to repel the worst efforts of cyber attackers and hone their skills. Enterprises, non-profits, universities and global governments can buy a cyber range, buy time on a cyber range—or even build their own or use less immersive gamification platforms to train. Practice makes perfect, and by using a cyber range, security candidates can become experts without any organization needing to exposure their infrastructure. Join our conversation as we discuss how to use cyber ranges throughout the entire lifecycle of a security professional—from screening and assessing candidates to onboarding and retention—as well as how they improve SOC productivity and preparedness for real-world attacks.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 19, 2020
5:30pm - 8:30pm
The Capital Grille
1861 International Dr.
McLean, VA 22102

Mike Newborn
Chief Information Security Officer
Navy Federal Credit Union

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 18, 2020
5:30pm - 8:30pm
Morton’s The Steakhouse
227 W Trade St., Suite 150
Charlotte, NC 28202
Tim Morris

Tim Morris
Information Security Area Manager, SVP, Cyber Threat Engineering & Research
Wells Fargo & Company
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 12, 2020
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
murphy_sean

Sean Murphy
SVP, CISO
BECU
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 11, 2020
5:30pm - 8:30pm
Waterbar
399 The Embarcadero
San Francisco, CA 94105
hahn_david

David Hahn
Chief Security Officer
Silicon Valley Bank
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Stop Buying Security Products: Fix Your Security Posture Using What You Have

February 5, 2020
5:30pm - 8:30pm
Del Frisco's Double Eagle Steakhouse
236 Perimeter Center Pkwy NE
Suite 120
Dunwoody, GA 30346
Tony Spurlin

Tony Spurlin
Vice President & Chief Security Officer
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

Is your organization protected against every known attack, including the vulnerabilities announced yesterday? Zero-day attacks garner plenty of attention, but the truth is 99% of all cyberattacks occur due to hackers exploiting existing or known vulnerabilities. You likely already have cybersecurity products that could protect you, but chances are they have not been configured correctly to your enterprise’s specific risk profile. For instance, Gartner estimates that 95% of firewall breaches are caused by simple firewall misconfigurations, yet 97% of breaches are still happening to companies that have already deployed the right controls. Breaches are arising more often because complexity is your enemy. If your security team is managing too many solutions—some of which might not be optimal for your current enterprise security requirements—then a simple misconfiguration or drift is all an attacker needs to exploit within your security stack to gain entrance. You do not need another security product. You just need to use what you have, better. Join our conversation as we discuss how to continually and safely test every part of your security infrastructure for gaps as well as how to prioritize remediation based on business risk.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 30, 2020
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4023 Oak Lawn Ave
Dallas, TX 75219
Shamoun Siddiqui

Shamoun Siddiqui
VP, CISO
Neiman Marcus
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 29, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
114 W. 7th Street #110
Austin, TX 78701

Sameer Sait
CISO, Whole Foods Market
Amazon
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 28, 2020
5:30pm - 8:30pm
Steak 48
4444 Westheimer Rd., Ste A100
Houston, TX 77027

Martin Littmann
CTO & CISO
Kelsey-Seybold Clinic
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

Women in Cybersecurity 2020

January 27, 2020
5:30pm - 7:45pm
UHY Advisors
6 Concourse Parkway
Suite 1700
Atlanta, GA 30328

Moderator:

Harper Lisa Bronson
Enterprise Portfolio Manager
Signature Consultants

Panelists:

Donna Gallaher
CEO & President
New Oceans Enterprises LLC

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Cindy Taylor
COO
Ensignis

Don’t miss the conversation around the topic that has been mentioned everywhere as one of the key issues for this decade. Women in IT are a minority, but Women in Cybersecurity are a true rarity. Be prepared to hear how these female executive cyber experts contribute to the field of defense in our nation and institutions.

Digital Hands 7th Annual Gasparilla Cybersecurity Summit
Preparing the Cybersecurity Workforce: Education, Simulation and Demographics

January 24, 2020
10:45am - 11:25am
Fletcher Lounge in Plant Hall
374 UT University Dr.
Tampa, FL, 33606
More Information

Panelists:

Cabrera_Eduardo

Eduardo Cabrera
Chief Cybersecurity Officer
Trend Micro

Ensmann_Mai

Mai Ensmann
Associate to the Director
Georgia State University’s Evidence-Based Cybersecurity Research Group

Gordon_Debbie

Debbie Gordon
CEO
Cloud Range

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Join Digital Hands’ panel where these top-tier leaders discuss improving diversity, education and mentorship in cybersecurity to shift our focus in the industry towards optimal success and a greater, stronger workforce.

Digital Hands 7th Annual Gasparilla Cybersecurity Summit
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

January 24, 2020
4:00pm - 4:30pm
Fletcher Lounge in Plant Hall
374 UT University Dr.
Tampa, FL, 33606
More Information

Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

January 23, 2020
5:30pm - 8:30pm
Harbour 60
60 Harbour St.
Toronto, ON M5J 1B7
thompson_greg

Greg Thompson
Vice President, Chief Information Security Officer
Manulife
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Farewell to Network Security as We Know It

January 22, 2020
5:30pm - 8:30pm
The Capital Grille
1861 International Dr
McLean, VA 22102

Netskope Executive Speaker:

Sean Cordero
VP of Cloud Strategy
Netskope
Biography

ISE® VIP Host:

Evette Maynard-Noel Evette Maynard-Noel
Deputy CISO
Cybersecurity and Infrastructure Security Agency (CISA)
Biography

Digital transformation as well as cloud-first and mobile-first security strategies are impacting every company across the globe, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can we manage the risk of what we cannot control or see? The problem exacerbates when we consider if we are granting users too much access to data we are not monitoring closely enough. Adopting a Zero Trust model could be the way to go, and top cloud security use cases are also driving the need for high-speed edge networks with security that follows the user, not the device. If you’re stuck using a legacy security stack, however, these options may not be easily enacted, but change is possible. Join our conversation as we discuss how to transform your network security strategy; integrate true Zero Trust; and address next-gen strategies using firewalls (NGFW), secure web gateways (SWGs), secure access (VPNs) and high-speed edge networks.

ISE® PRIVATE DINNER
Farewell to Network Security as We Know It

January 21, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
4 Perimeter Park South
Birmingham, AL 35243

Netskope Executive Speaker:

Nate Smolenski

Nate Smolenski
Director of Enterprise Strategy
Netskope

ISE® VIP Host:

Rasco_Brian

Brian Rasco
Director of Information Security
Nationally Ranked Medical Center
Biography

Digital transformation as well as cloud-first and mobile-first security strategies are impacting every company across the globe, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can we manage the risk of what we cannot control or see? The problem exacerbates when we consider if we are granting users too much access to data we are not monitoring closely enough. Adopting a Zero Trust model could be the way to go, and top cloud security use cases are also driving the need for high-speed edge networks with security that follows the user, not the device. If you’re stuck using a legacy security stack, however, these options may not be easily enacted, but change is possible. Join our conversation as we discuss how to transform your network security strategy; integrate true Zero Trust; and address next-gen strategies using firewalls (NGFW), secure web gateways (SWGs), secure access (VPNs) and high-speed edge networks.

ISE® PRIVATE DINNER
From Known to Zero-Day Threats: Leverage AI for Continuous Detection and Response

January 16, 2020
5:30pm - 8:30pm
Tulio – Kimpton Hotel Vintage
1100 Fifth Ave.
Seattle, WA 98101
Kevin Morrison

Kevin Morrison
Director of Information Security (CISO) and Architecture
Coinstar
ISE® Southeast People’s Choice Award Winner 2015
Biography

The cybersecurity talent shortage along with overwhelming numbers of security alerts mean enterprise security teams have little time to hunt and analyze the threats that matter. While security teams naturally want to defend their organizations against the threats they know about, they sometimes lack the resources to do so. With zero-day vulnerabilities especially, security teams might not know they have them, and if they do, they cannot patch them before a cyber attacker successfully exploits them. By utilizing AI and 24/7 managed detection and response, security members can be taken out of the weeds and elevated to conduct transparent, proactive threat hunting in real time. Join our conversation as we discuss the challenges enterprise security teams face to locate and remediate vulnerabilities and how they can collaborate best with an MSSP’s platform that incorporates data science, threat research and human expertise to limit a breach’s impact.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 15, 2020
5:30pm - 8:30pm
Oak Steakhouse
4777 Sharon Rd #125
Charlotte, NC 28210
cody_drake

Drake Cody
Assistant VP, Cyber-Security Operations
Brighthouse Financial

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 14, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Lamberg_Mike

Mike Lamberg
VP, CISO
OpenLink Financial

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.