Archived Events 2021

ISE® FIRESIDE WEBINAR
Protecting Your Achilles Heel: Identity and Access Privileges in AWS & Azure

June 17, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Dan Goldstein

Arick Goomanovsky
CBO & Co-Founder
Ermetic
Biography

Bob Varnadoe

Bob Varnadoe
Chief Information Security Officer
NCR
ISE® Southeast Executive Award Finalist 2018
Biography

Identities are the Achilles heel of Cloud Infrastructure security. They are the biggest risk that you are not yet addressing. According to Gartner, 75% of security failures in AWS, Azure and GCP are due to mismanagement of access entitlements and privileges. Why? Because there are thousands of human and service identities in a typical cloud environment, and each one is affected by a complex web of permissions and privileges that determine who can access what. Access privileges are the largest attack surface and the hardest one to assess and mitigate. Many organizations don’t fully comprehend the risk or the complexity when they migrate to the cloud. Join our conversation as we explore unique challenges of managing identities and access in the cloud—for both people and services—as well as how to cope with those challenges using tools provided by cloud providers and new emerging technologies.

Attendees of the ISE® Fireside Webinars are eligible to earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Redefining the Post-Pandemic Work Environment and Its Implications to Insider Risk

June 16, 2021
5:30-6:45pm CT

SOUTH CENTRAL REGION: Arkansas, Louisiana, Oklahoma, Texas

ISE® VIP Hosts:

Beth Anne Bygum

Beth Anne Bygum
Vice President, Chief Security & Compliance Officer
Acxiom

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Over the past months, we have come to grips with the security challenges posed by the work-from-home trend. With vaccination rates increasing, organizations are starting to focus on the post-pandemic world. Your organization may be exploring an increase in recruiting to address growth, retention challenges as employees evaluate options, more permanent remote work arrangements to tap into a bigger talent pool, and/or technologies to enhance employee experiences. CISOs across industries are evaluating these options’ implications on data security, especially on mitigating insider risks. Our fast-paced, cloud connected, highly collaborative world creates greater risks of valuable data leakages, loss, and theft, whether employees are deliberately malicious or acting negligently. Boards and C-suites have expressed growing interest in insider risk management: where is data exposed, who is putting data at risk and how, what risks are acceptable, how to prioritize events, and how to effectively respond while maintaining trust in a zero-trust world. Join our conversation to learn more about insider risk management, its current trends, the strategies you and your peers are adopting, and how to build an effective insider threat program that aligns with the pace of today's collaborative business culture.

Attendees of the ISE® Cocktails and Conversations are eligible to earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Personal Preference vs. Corporate Policy: The Return to In-Person Events and Meetings

June 16, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Marc Crudgington

Marc Crudgington
CISO, SVP Information Security
Woodforest National Bank
ISE® Central Executive Award Finalist 2019
ISE® North America Executive: Financial Award Winner 2019

Biography

Alexandra Gobbi

Alexandra Gobbi
CMO
Code42
Biography

Kevin McKenzie

Dr. Kevin McKenzie
VP & CISO
Dollar Tree Stores
ISE® Southeast Executive Award Winner 2013
ISE® North America Academic Executive Award Winner 2013

Biography

Some states are now relaxing and concluding COVID-19-related restrictions, and businesses are eager to resume operations. Corporate leadership may be juggling competing interests around policies for returning to in-person meetings and events while having to address liability and safety for their employees. Nevertheless, many security professionals have a strong interest to return to in-person corporate events. Join our conversation for a top-of-mind discussion on how the cybersecurity industry is balancing personal preference with corporate policy.

ISE® COCKTAILS AND CONVERSATIONS
Redefining the Post-Pandemic Work Environment and Its Implications to Insider Risk

June 15, 2021
5:30-6:45pm PT

WEST REGION: Alaska, Arizona, California, Colorado, Hawaii, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, Wyoming

ISE® VIP Hosts:

Chuck Markarian

Chuck Markarian
CISO
PACCAR
ISE® West Executive of the Year Award Winner 2018
ISE® West People's Choice Award Winner 2018

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Over the past months, we have come to grips with the security challenges posed by the work-from-home trend. With vaccination rates increasing, organizations are starting to focus on the post-pandemic world. Your organization may be exploring an increase in recruiting to address growth, retention challenges as employees evaluate options, more permanent remote work arrangements to tap into a bigger talent pool, and/or technologies to enhance employee experiences. CISOs across industries are evaluating these options’ implications on data security, especially on mitigating insider risks. Our fast-paced, cloud connected, highly collaborative world creates greater risks of valuable data leakages, loss, and theft, whether employees are deliberately malicious or acting negligently. Boards and C-suites have expressed growing interest in insider risk management: where is data exposed, who is putting data at risk and how, what risks are acceptable, how to prioritize events, and how to effectively respond while maintaining trust in a zero-trust world. Join our conversation to learn more about insider risk management, its current trends, the strategies you and your peers are adopting, and how to build an effective insider threat program that aligns with the pace of today's collaborative business culture.

Attendees of the ISE® Cocktails and Conversations are eligible to earn 1 CPE upon its conclusion.

T.E.N. Tech Talks
How Putting Data Protection First Makes Remote Workers More Productive

June 15, 2021
12:00 PM – 12:45 PM ET
9:00 AM – 9:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

ISE® Tech Speakers:

Todd Beebe

Todd Beebe
Information Security Officer
Freeport LNG
Biography

Jim Fulton

Jim Fulton
Head of SASE/Zero Trust Solutions
Forcepoint
Biography

With hybrid workforces becoming the norm for many organizations, keeping business data safe everywhere it is used is crucial to enabling people to work anywhere. Enforcing the same policies consistently from the endpoint, through the network, and into both the web and cloud requires a new approach. Join our conversation where we will learn how new data-first SASE cloud security is safely boosting productivity while eliminating complexity and costs for distributed businesses and government agencies.

Attendees of the T.E.N. Tech Talks are eligible to earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
A Modern Shift: Merging SASE and Zero Trust

June 10, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Haddon Bennett

Haddon Bennett
Chief Information Security Officer
Inspire Brands

Dan Goldstein

Dan Goldstein
Head of New Product Go-To-Market & Revenue
Cloudflare
Biography

Barry Suskind

Barry Suskind
Threat Detection and Response, Cyber & Information Security
FINRA

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility, and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation. Organizations will need to get themselves in the best position for this transition. Join our conversation as we discuss the problems SASE can address in the modern enterprise as well as the benefits of planning both SASE and zero trust implementations.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Cloud Security Essentials: Protecting Your People and Data at the Pace of Business

June 9, 2021
5:30-6:45pm CT
6:30-7:45pm ET

NORTH CENTRAL REGION: Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska, North Dakota, Ohio, South Dakota, Wisconsin

ISE® VIP Hosts:

Brenda Callaway

Brenda Callaway
Divisional Vice President, Information Security Risk Management
HCSC
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Business leaders continued to rapidly adopt the cloud, meaning that cybersecurity teams must shift their mindset from building protective walls that hinder productivity to securing data in a complex environment. Security teams must ensure that the cloud’s risks do not outweigh its advantages by placing security as a business enabler rather than as an inhibiter—yet cloud security means different things to different people. As we develop our cloud security strategies, we should keep in mind the essentials while remaining holistic and effective in our approach to protect our people and data at the pace of business. At its core, cloud security is about data protection, access control and device management, risk analysis and automated enforcement. Join our discussion to learn how to plan and implement a business-enabling security strategy in a complex multi-/hybrid-cloud enterprise.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

2021 ISSA Metro Atlanta’s 4th Annual Women in Security Event
Keynote Address: Empowering Female Voices: How to Nurture the Next Generation of Cyber Leadership

June 8, 2021
7:30-7:45pm ET
Registration

wilson_rachel

Rachel Wilson
Managing Director, Head of Wealth Management Data Security and Infrastructure Risk
Morgan Stanley
Biography


2021 ISSA Metro Atlanta’s 4th Annual Women in Security Event
The Path Forward: Retaining Future Women Leaders in Cybersecurity With More Empathetic Workplaces

June 8, 2021
7:45-8:15pm ET
Registration

Moderator/Emcee:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Betty Burke

Betty Burke
Board of Directors
ISSA
Biography

Debbie Wheeler

Deborah Wheeler, CISSP
VP, Chief Information Security Officer
Delta Air Lines
Biography
ISE® Central People's Choice Award Winner 2007
ISE® Central Executive Award Finalist 2007

wilson_rachel

Rachel Wilson
Managing Director, Head of Wealth Management Data Security and Infrastructure Risk
Morgan Stanley
Biography


At the start of 2020, women in the cybersecurity workforce remained underrepresented, but the numbers were trending in the right direction. However, the COVID-19 crisis has negatively impacted women—especially women of color—and presented greater challenges including higher chances of unemployment, burnout and more barriers to advancement. Cybersecurity and other industries stand at risk of losing women in leadership roles since many are being forced to consider downshifting their careers or leaving the workforce. Companies have opportunities to mitigate this risk by creating more flexible, empathetic remote work environments—a worthwhile investment since losing women leaders will cost them. McKinsey & Company’s 2020 Women in the Workplace research study shows that company profits and share performance can be close to 50 percent higher when women are well represented at the top. Women are also more likely than men to consistently take a public stand for gender and racial equity at work as well as mentor and sponsor other women. In short, women have enormous value in the workplace, and it’s crucial for current InfoSec professionals to impress that point on women who are considering entering or leaving the industry. Join our conversation as we discuss how women can be empowered amongst these workplace challenges in cybersecurity, including sharing the professional paths open to them, mentorship opportunities, advice for confident salary negotiation and much more.

ISE® COCKTAILS AND CONVERSATIONS
Detect Modern Threats Without a Threat to Your Budget

June 8, 2021
5:30-6:45pm ET

NORTHEAST REGION: Delaware, New York, New Jersey, Pennsylvania, Maryland, Virginia, Washington DC, West Virginia

Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Donna Ross

Donna Ross
Executive Vice President
Chief Information Security Officer
Radian Group
Biography

Organizations are rapidly shifting their business models and corresponding technology environments to quickly respond to this new digital transformation era and compete with one another. Some of these challenges include data collection, analysis, and decisioning, all while the attack surface continues to grow. With an expanding attack surface, a shortage of security talent, and an overwhelming amount of alerts, security teams need tools and strategies to modernize their SOC. Join our conversation to learn strategies and best practices to help you bring your enterprise SOC to the next level in a simple and cost-effective scale.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
How To Fight Fraud With Digital Identity Verification While Reducing Customer Friction and Cost

June 3, 2021
5:30-6:45pm ET
4:30-5:45pm CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, Washington DC, West Virginia

ISE® VIP Hosts:

Ken Foster

Ken Foster
Head of Global Cyber Risk Governance
Fiserv

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

When it comes to the user experience, 92% of customers expect a fast, frictionless interaction that is trustworthy and secure. Unfortunately, most of today’s tools used to secure digital experiences have not managed to fully stop the risks of online fraud. Legacy methods, like multifactor authentication (MFA) and device fingerprinting, still fall short of preventing account take-over (ATO), new account fraud (NAF), synthetic and mule accounts, phishing and credential stuffing attacks. Security teams attempting to employ new controls to lockdown the risks have managed to add more disruption to the user experience. As the digital world evolves, how can you verify digital identity in a way that more successfully prevents fraud both at lower costs and without driving consumers away? Join our conversation where we will explore the capabilities of behavioral biometrics and the role this method plays in reducing fraud and digital risk while keeping consumers happy.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Why Asset Management Fails for Cybersecurity (and How to Fix It)

May 26, 2021
5:30-6:45pm CT

CENTRAL REGION - HEALTHCARE ONLY: Arkansas, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Michigan, Minnesota, Missouri, Nebraska, North Dakota, Ohio, Oklahoma, South Dakota, Texas, Wisconsin

ISE® VIP Hosts:

Manikin_Stoddard

Stoddard Manikin
CISO
Children's Healthcare of Atlanta
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Although responsibilities for IT asset management traditionally live outside the security team, everything we do in cybersecurity relies on a foundation of knowing what devices, cloud instances, and users are in the environment. The explosion in the number and types of devices, the rate of change, and the blurring of the perimeter only compound the problem and make solving asset management a priority for CISOs and security teams. With our organizations facing such complexities, knowing the difference between IT asset management and cybersecurity asset management is crucial—as is having an effective plan for both. Join our conversation as we discuss how to solve asset management, including the security frameworks that can help you establish a foundation; the data from your current solutions you can leverage to achieve an updated, accurate asset inventory; and more best practices.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Preventing Supply Chain Attacks Using Cloud-Native Email Security Techniques

May 25, 2021
5:30-6:45pm PT

WEST REGION: Alaska, Arizona, California, Colorado, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, Wyoming

Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Selim Aissi
Senior Vice President & Chief Information Security Officer
ICE Mortgage Technology
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Your supply chain partners represent a significant cyber risk as demonstrated recently by the FireEye and SolarWinds breaches. More attackers are exploiting an organization's suppliers, partners and vendors to launch phishing campaigns—the top source of breaches. These new tactics bypass cloud email defenses, legacy email gateways and email authentication standards. Mitigating breaches from a compromised supply chain requires a new approach to securing your third-party cloud and digital communications. Join our conversation to discuss common supply chain-based attack methods including partner spoofing, Business Email Compromise, new domain campaigns, and malicious URLs; real examples of supply chain phishing attacks; and the advanced, cloud-native email security techniques that proactively block these attacks in progress.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Redefining the Post-Pandemic Work Environment and Its Implications to Insider Risk

May 25, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Maryland, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont, Virginia, Washington DC, West Virginia

Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Lauren Rosenblatt

Lauren Dana Rosenblatt
VP, Chief Information Security Officer
International Flavors & Fragrances

Over the past months, we have come to grips with the security challenges posed by the work-from-home trend. With vaccination rates increasing, organizations are starting to focus on the post-pandemic world. Your organization may be exploring an increase in recruiting to address growth, retention challenges as employees evaluate options, more permanent remote work arrangements to tap into a bigger talent pool, and/or technologies to enhance employee experiences. CISOs across industries are evaluating these options’ implications on data security, especially on mitigating insider risks. Our fast-paced, cloud connected, highly collaborative world creates greater risks of valuable data leakages, loss, and theft, whether employees are deliberately malicious or acting negligently. Boards and C-suites have expressed growing interest in insider risk management: where is data exposed, who is putting data at risk and how, what risks are acceptable, how to prioritize events, and how to effectively respond while maintaining trust in a zero-trust world. Join our conversation to learn more about insider risk management, its current trends, the strategies you and your peers are adopting, and how to build an effective insider threat program that aligns with the pace of today's collaborative business culture.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Maximize Security Control Effectiveness, Invest Smart and Prioritize Risk

May 19, 2021
5:30-6:45pm CT
6:30-7:45pm ET

NORTH CENTRAL REGION: Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska, North Dakota, Ohio, South Dakota, Wisconsin

ISE® VIP Hosts:

Robert Allen

Robert Allen
Global Chief Information Security Officer
Gallagher

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

CISOs want to address and mitigate the most significant risk with the greatest impact to the business. They want to know which controls address this risk and advise on appropriate investments to reduce overall risk. The challenge is a lack of visibility into security control effectiveness and an inability to measure how security controls work together. In fact, a Gartner Research study shows that 73% of standard audit questions relate to the existence of controls, but not their performance. Additionally, the study reports that 95% of breaches come from known attacks—not zero days. There are ways to assess and benchmark your risk posture, identify the gaps and measure progress. Join our discussion which will focus on your risk mitigation challenges and how you can derive the most value and effectiveness from the security controls you have already invested in.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Detect Modern Threats Without a Threat to Your Budget

May 13, 2021
5:30-6:45pm ET
4:30-5:45pm CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Mississippi, North Carolina, South Carolina

ISE® VIP Hosts:

Mike Mahon

Mike Mahon
Director, Security Operations
LabCorp

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations are rapidly shifting their business models and corresponding technology environments to quickly respond to this new digital transformation era and compete with one another. Some of these challenges include data collection, analysis, and decisioning, all while the attack surface continues to grow. With an expanding attack surface, a shortage of security talent, and an overwhelming amount of alerts, security teams need tools and strategies to modernize their SOC. Join our conversation to learn strategies and best practices to help you bring your enterprise SOC to the next level in a simple and cost-effective scale.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Detect Modern Threats Without a Threat to Your Budget

May 12, 2021
5:30-6:45pm PT
6:30-7:45pm MT

SOUTHWEST REGION: Arizona, Colorado, Hawaii, New Mexico, Nevada, Southern California (South Bay area and below) & Utah

ISE® VIP Hosts:

Larry Lidz

E. Larry Lidz
Cloud Chief Information Security Officer
Cisco Systems
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations are rapidly shifting their business models and corresponding technology environments to quickly respond to this new digital transformation era and compete with one another. Some of these challenges include data collection, analysis, and decisioning, all while the attack surface continues to grow. With an expanding attack surface, a shortage of security talent, and an overwhelming amount of alerts, security teams need tools and strategies to modernize their SOC. Join our conversation to learn strategies and best practices to help you bring your enterprise SOC to the next level in a simple and cost-effective scale.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
It’s a Cloud Revolution: Enhancing Your Cloud Security Strategy With Cloud Access Security Brokers (CASBs)

May 12, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont

ISE® VIP Hosts:

Bobby Edamala
Chief Information Security Officer
Cornell University

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Remote work has caused considerable changes in cloud security, including an explosion of collaborative services as well as a spike in external threats that target unprotected data. The rush to join the cloud revolution has enabled greater communication and sharing between users. Because of how quickly apps like Microsoft Teams and Office 365 have grown, more cloud security controls are needed, including Data Loss Prevention (DLP), device and guest access, malware defenses and campaign awareness, user behavior analytics for insider threats, Cloud Security Posture Management (CSPM), container security, incident response management and more. Obtaining visibility and control over data and threats in these areas across a multi-cloud environment is of paramount importance, which is where Cloud Access Security Brokers (CASBs) can come into play. CASBs can help security and risk management leaders discover all their cloud services and assess cloud risk while protecting sensitive information and detecting threats. Join our conversation as we discuss the changes our cloud security measures are undergoing along with the essential role CASBs can serve within your cloud security strategies.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® Financial Services Summit 2021

The ISE® Financial Services Summit was held May 12, 2021 on GoExhibit and Zoom, a digital platform experience. The ISE® Financial Services Summit is a one day Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from the financial services industry to discuss and share insights into today's issues and solutions. Details

ISE® COCKTAILS AND CONVERSATIONS
Detect Modern Threats Without a Threat to Your Budget

May 11, 2021
5:30-6:45pm PT
6:30-7:45pm MT

NORTHWEST REGION: Alaska, Idaho, Montana, Northern California (San Francisco and North), Oregon, Washington, Wyoming

ISE® VIP Hosts:

Al Ghous

Al Ghous
Chief Information Security Officer
Envision Digital

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations are rapidly shifting their business models and corresponding technology environments to quickly respond to this new digital transformation era and compete with one another. Some of these challenges include data collection, analysis, and decisioning, all while the attack surface continues to grow. With an expanding attack surface, a shortage of security talent, and an overwhelming amount of alerts, security teams need tools and strategies to modernize their SOC. Join our conversation to learn strategies and best practices to help you bring your enterprise SOC to the next level in a simple and cost-effective scale.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Digital Transformation Calls for Digital Security

May 11, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Eric Meyers

Eric Meyers
VP, Chief Information Security Officer
New York Power Authority
Biography

Colton Pepper

Colton Pepper
Security Solutions Architect
Qualys

Richard Rushing

Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography

Many companies are full speed ahead on their digital transformation initiatives even at the expense of cybersecurity measures designed to protect their infrastructure against security risks. The rapid adoption of cloud services, IoT, application containers and other technologies is helping drive organizations forward. However, it also means that security teams must work harder to maintain visibility over these new threat landscapes. To do so, they need to be able to continuously see and catalog every asset in their environment and determine accurately what the security status is of their devices. For that, an advanced Vulnerability Management, Detection and Response (VMDR) solution with built-in orchestration is required to maintain real-time digital security. Join our conversation as we discuss the cyber risks security teams face and why more effective digital security via VMDR matters in this crucial age of digital transformation.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
The Economic Benefits to Smarter Threat Intelligence and Risk Mitigation

May 6, 2021
5:30-6:45pm CT

SOUTH CENTRAL REGION: Arkansas, Louisiana, Oklahoma, Texas

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Shirley_Devin

Devin Shirley
Chief Information Security Officer
Blue Cross Blue Shield Arkansas

Our increasingly remote workforce needs access to applications and resources across various geographic regions, networks and devices. To keep employees working effectively, enterprises had to quickly implement new solutions, ease restrictions and policies and remove barriers to entry, leaving security teams the responsibility of protecting the enterprise against attacks that would take advantage of these changes. To do so, security teams need to collect meaningful threat intelligence, which is difficult to manage and even harder to implement. Even SOCs, which are better equipped for threat detection and response, are generally overwhelmed, its resources stretched and its experts expensive to find, train and retain. Fortunately, SOCs and threat hunting teams no longer have to perform threat intelligence piecemeal across multiple solutions whenever time allows. They now have the option to utilize a single pane of glass for intelligence, saving on both time and cost. Join our conversation as we discuss how security teams can harness a single platform to automate and operationalize threat intelligence to speed up threat detection and enable proactive defensive measures.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Preventing Supply Chain Attacks Using Cloud-Native Email Security Techniques

May 5, 2021
5:30-6:45pm CT
6:30-7:45pm ET

NORTH CENTRAL REGION: Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska North Dakota, Ohio, South Dakota, Wisconsin

ISE® VIP Hosts:

Brickey_Jon

Jon Brickey
SVP, Cybersecurity Evangelist
Mastercard

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Your supply chain partners represent a significant cyber risk as demonstrated recently by the FireEye and SolarWinds breaches. More attackers are exploiting an organization's suppliers, partners and vendors to launch phishing campaigns—the top source of breaches. These new tactics bypass cloud email defenses, legacy email gateways and email authentication standards. Mitigating breaches from a compromised supply chain requires a new approach to securing your third-party cloud and digital communications. Join our conversation to discuss common supply chain-based attack methods including partner spoofing, Business Email Compromise, new domain campaigns, and malicious URLs; real examples of supply chain phishing attacks; and the advanced, cloud-native email security techniques that proactively block these attacks in progress.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Accelerating Vulnerability Response to Lessen the Impact of Inevitable Cyberattacks

April 29, 2021
5:30-6:45pm ET

MID-ATLANTIC REGION: Pennsylvania, Washington D.C., Maryland, Delaware, Virginia, West Virginia

ISE® VIP Hosts:

Todd Bearman

Todd Bearman
VP, CISO Global Infrastructure and Security Solutions
TE Connectivity

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Every organization hosts critical vulnerabilities within their cybersecurity infrastructure. Though security teams work tirelessly to locate and mitigate them, threat actors continue to bypass defenses and exploit these vulnerabilities to damage enterprises. Having effective vulnerability response measures in place is crucial to lessen the impact a breach will have to business reputation and data security. However, many of our vulnerability response plans simply do not move fast enough, with many organizations knowing they are vulnerable but being unable to employ patches due to overreliance on manual processes, siloed information and a lack of visibility. As cybercriminals continue developing advanced attack methods with machine learning and artificial intelligence, we must do all we can to level the playing field. Join our conversation as we discuss how to take a holistic, accelerated approach to vulnerability response by interlocking all components of security, risk and IT for coordinated remediation.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modern Risk Management: Locating, Prioritizing, and Minimizing Risks to Your Business

April 28, 2021
5:30-6:45pm ET
4:30-5:45pm CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, Washington DC, West Virginia

ISE® VIP Hosts:

Farley_Paul

Paul Farley
Deputy CISO
NCR
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

More organizations are turning to a modern Risk Management path, which allows them to approach the scope of risk and audits in scalable, dynamic ways. Accomplishing tasks like security assessments, risk communications and compliance in real time has never been more important given the speed and complexity of advanced cyberattacks. However, in order to achieve a modern approach to risk management, enterprise programs must integrate vital processes such as continuous optimization, automated risk-based prioritization and insights, and the automatic operationalization of security controls. Typically, these processes occur in silos, making the need for mature, unified risk management that much more important. Join our conversation as we discuss the attributes of modern risk management programs, including better ways to strategically locate and prioritize risks, assess business risks, and mitigate current pain points for overwhelmed security teams.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
The Expanding Role and Profile of the CISO: Thought Leader and Change Agent

April 28, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Don Boian

Don Boian
Cyber Security Outreach Director
Huntington National Bank

DeSantis_Daniel

Daniel DeSantis
Director, Americas, CISO Advisory
Cisco

Bryan McDowell

Bryan McDowell
VP, Chief Security Officer
University Hospitals

We are who we are today because of the experiences we endured, enjoyed and suffered through in our past. Likewise, Cybersecurity evolves based on past events. In order to grow, we have to briefly look at our past to examine the lessons we learned and the failures we encountered. Through this reflection, we can recognize how our industry has changed and identify some of its foundational causes—be it the evolving threat landscape; public and regulatory mandates; computing and infrastructure change; or other events of the day. We must also take a look into the future and predict where we will have technology gaps, talent shortfalls and application limitations in order to prepare and become more resilient within our organizations. By getting out in front of this inevitable changing landscape, CISOs will be better equipped to continuously deal with more complex vulnerabilities; and the CISO will be viewed as a partner to the business while still advocating for a secure operating environment. Join our discussion regarding the evolving role of the CISO as we ask ourselves: will we continue to tire ourselves out by swimming against the tides of change, or will we harness that energy and ride the waves forward?

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Accelerating Vulnerability Response to Lessen the Impact of Inevitable Cyberattacks

April 22, 2021
5:30-6:45pm ET

FLORIDA*

ISE® VIP Hosts:

Eppinger_Gary Gary Eppinger
Global CISO and Corporate Privacy Officer
Carnival Corporation & plc
Biography
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Every organization hosts critical vulnerabilities within their cybersecurity infrastructure. Though security teams work tirelessly to locate and mitigate them, threat actors continue to bypass defenses and exploit these vulnerabilities to damage enterprises. Having effective vulnerability response measures in place is crucial to lessen the impact a breach will have to business reputation and data security. However, many of our vulnerability response plans simply do not move fast enough, with many organizations knowing they are vulnerable but being unable to employ patches due to overreliance on manual processes, siloed information and a lack of visibility. As cybercriminals continue developing advanced attack methods with machine learning and artificial intelligence, we must do all we can to level the playing field. Join our conversation as we discuss how to take a holistic, accelerated approach to vulnerability response by interlocking all components of security, risk and IT for coordinated remediation.

*Qualifying executives whose company headquarters reside in this location are invited to attend.

ISE® COCKTAILS AND CONVERSATIONS
Accelerating Vulnerability Response to Lessen the Impact of Inevitable Cyberattacks

April 21, 2021
5:30-6:45pm ET

NORTH CAROLINA & SOUTH CAROLINA*

ISE® VIP Hosts:

William Curtiss

William Curtiss
CISO
Hanesbrands Inc.
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Every organization hosts critical vulnerabilities within their cybersecurity infrastructure. Though security teams work tirelessly to locate and mitigate them, threat actors continue to bypass defenses and exploit these vulnerabilities to damage enterprises. Having effective vulnerability response measures in place is crucial to lessen the impact a breach will have to business reputation and data security. However, many of our vulnerability response plans simply do not move fast enough, with many organizations knowing they are vulnerable but being unable to employ patches due to overreliance on manual processes, siloed information and a lack of visibility. As cybercriminals continue developing advanced attack methods with machine learning and artificial intelligence, we must do all we can to level the playing field. Join our conversation as we discuss how to take a holistic, accelerated approach to vulnerability response by interlocking all components of security, risk and IT for coordinated remediation.

*Qualifying executives whose company headquarters reside in this location are invited to attend.

ISE® COCKTAILS AND CONVERSATIONS
Modern Risk Management: Locating, Prioritizing, and Minimizing Risks to Your Business

April 15, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Dave Snyder
Chief Information Security Officer
Independence Blue Cross
ISE® Northeast Executive Award Finalist 2019
Biography

More organizations are turning to a modern Risk Management path, which allows them to approach the scope of risk and audits in scalable, dynamic ways. Accomplishing tasks like security assessments, risk communications and compliance in real time has never been more important given the speed and complexity of advanced cyberattacks. However, in order to achieve a modern approach to risk management, enterprise programs must integrate vital processes such as continuous optimization, automated risk-based prioritization and insights, and the automatic operationalization of security controls. Typically, these processes occur in silos, making the need for mature, unified risk management that much more important. Join our conversation as we discuss the attributes of modern risk management programs, including better ways to strategically locate and prioritize risks, assess business risks, and mitigate current pain points for overwhelmed security teams.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
It’s a Cloud Revolution: Enhancing Your Cloud Security Strategy With Cloud Access Security Brokers (CASBs)

April 14, 2021
5:30-6:45pm PT
6:30-7:45pm MT

WEST REGION: Alaska, Arizona, California, Colorado, Hawaii, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, Wyoming

ISE® VIP Hosts:

Bambawale_Sujeet

Sujeet Bambawale
CISO
7- Eleven

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Remote work has caused considerable changes in cloud security, including an explosion of collaborative services as well as a spike in external threats that target unprotected data. The rush to join the cloud revolution has enabled greater communication and sharing between users. Because of how quickly apps like Microsoft Teams and Office 365 have grown, more cloud security controls are needed, including Data Loss Prevention (DLP), device and guest access, malware defenses and campaign awareness, user behavior analytics for insider threats, Cloud Security Posture Management (CSPM), container security, incident response management and more. Obtaining visibility and control over data and threats in these areas across a multi-cloud environment is of paramount importance, which is where Cloud Access Security Brokers (CASBs) can come into play. CASBs can help security and risk management leaders discover all their cloud services and assess cloud risk while protecting sensitive information and detecting threats. Join our conversation as we discuss the changes our cloud security measures are undergoing along with the essential role CASBs can serve within your cloud security strategies.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
The Changing Face of Insider Threats

April 13, 2021
5:30-6:45pm ET
4:30-5:45pm CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, Washington DC, West Virginia

ISE® VIP Hosts:

Frank Aiello

Frank Aiello
SVP, Chief Information Security Officer
MAXIMUS
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

As entire workforces remain in remote working conditions for the foreseeable future, the danger of insider threats is as unmistakable as ever. It is critical for businesses to recognize that threats from legitimate users can be more elusive and harder to detect or prevent than traditional external threats. That is because insiders have legitimate credentials and access, so they do not set off any alarms meant to keep external threat actors from accessing systems and privileged data. Though not always motivated by malicious intent, distracted employees are a concern to business viability and the potential damage they can cause. A combination of unsecured networks and personal devices; weak passwords; insufficient authentication methods; and employees misusing, circumventing, or exploiting corporate networks all cultivate fertile ground for the insider threat—whether unintentional or intentional. As a result, insider threat management is changing—again. Firstly, the idea of context has changed the categories of insider threat, and secondly, insider threat programs are now maturing and evolving into a more justifiable and friendly trusted insider program. Join our conversation as we discuss the evolving landscape of insider threats; the impact on insider risk; and practical strategies for an insider risk management program, such as investing in training, security analytics and automation tools, AI/ML-based security information, and event management (SIEM) systems.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
It’s a Cloud Revolution: Enhancing Your Cloud Security Strategy With Cloud Access Security Brokers (CASBs)

April 7, 2021
5:30-6:45pm CT
6:30-7:45pm ET

SOUTH CENTRAL REGION: Arkansas, Alabama, Louisiana, Mississippi, Oklahoma, Tennessee, Texas

ISE® VIP Hosts:

Adam Maslow

Adam Maslow
Sr. Director Information Security and Infrastructure
Raising Cane's

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Remote work has caused considerable changes in cloud security, including an explosion of collaborative services as well as a spike in external threats that target unprotected data. The rush to join the cloud revolution has enabled greater communication and sharing between users. Because of how quickly apps like Microsoft Teams and Office 365 have grown, more cloud security controls are needed, including Data Loss Prevention (DLP), device and guest access, malware defenses and campaign awareness, user behavior analytics for insider threats, Cloud Security Posture Management (CSPM), container security, incident response management and more. Obtaining visibility and control over data and threats in these areas across a multi-cloud environment is of paramount importance, which is where Cloud Access Security Brokers (CASBs) can come into play. CASBs can help security and risk management leaders discover all their cloud services and assess cloud risk while protecting sensitive information and detecting threats. Join our conversation as we discuss the changes our cloud security measures are undergoing along with the essential role CASBs can serve within your cloud security strategies.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
The Changing Face of Insider Threats

April 1, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont

ISE® VIP Hosts:

Mark Coderre

Mark Coderre
Vice President, Deputy CISO
Hanover Insurance Group
ISE® Northeast Executive Award Finalist 2009
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

As entire workforces remain in remote working conditions for the foreseeable future, the danger of insider threats is as unmistakable as ever. It is critical for businesses to recognize that threats from legitimate users can be more elusive and harder to detect or prevent than traditional external threats. That is because insiders have legitimate credentials and access, so they do not set off any alarms meant to keep external threat actors from accessing systems and privileged data. Though not always motivated by malicious intent, distracted employees are a concern to business viability and the potential damage they can cause. A combination of unsecured networks and personal devices; weak passwords; insufficient authentication methods; and employees misusing, circumventing, or exploiting corporate networks all cultivate fertile ground for the insider threat—whether unintentional or intentional. As a result, insider threat management is changing—again. Firstly, the idea of context has changed the categories of insider threat, and secondly, insider threat programs are now maturing and evolving into a more justifiable and friendly trusted insider program. Join our conversation as we discuss the evolving landscape of insider threats; the impact on insider risk; and practical strategies for an insider risk management program, such as investing in training, security analytics and automation tools, AI/ML-based security information, and event management (SIEM) systems.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
The Economic Benefits to Smarter Threat Intelligence and Risk Mitigation

March 30, 2021
5:30-6:45pm CT
6:30-7:45pm ET

NORTH CENTRAL REGION: Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska, North Dakota, Ohio, South Dakota, Wisconsin

ISE® VIP Hosts:

Chris Carter
AVP, Global Operations/Global Head of Security Analytics
Zurich Insurance
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Our increasingly remote workforce needs access to applications and resources across various geographic regions, networks and devices. To keep employees working effectively, enterprises had to quickly implement new solutions, ease restrictions and policies and remove barriers to entry, leaving security teams the responsibility of protecting the enterprise against attacks that would take advantage of these changes. To do so, security teams need to collect meaningful threat intelligence, which is difficult to manage and even harder to implement. Even SOCs, which are better equipped for threat detection and response, are generally overwhelmed, its resources stretched and its experts expensive to find, train and retain. Fortunately, SOCs and threat hunting teams no longer have to perform threat intelligence piecemeal across multiple solutions whenever time allows. They now have the option to utilize a single pane of glass for intelligence, saving on both time and cost. Join our conversation as we discuss how security teams can harness a single platform to automate and operationalize threat intelligence to speed up threat detection and enable proactive defensive measures.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modern Risk Management: Locating, Prioritizing, and Minimizing Risks to Your Business

March 25, 2021
5:30-6:45pm PT
6:30-7:45pm MT

WEST REGION: Alaska, Arizona, California, Colorado, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, Wyoming

ISE® VIP Hosts:

Kirkland_Andy

Andy Kirkland
CISO
Starbucks
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

More organizations are turning to a modern Risk Management path, which allows them to approach the scope of risk and audits in scalable, dynamic ways. Accomplishing tasks like security assessments, risk communications and compliance in real time has never been more important given the speed and complexity of advanced cyberattacks. However, in order to achieve a modern approach to risk management, enterprise programs must integrate vital processes such as continuous optimization, automated risk-based prioritization and insights, and the automatic operationalization of security controls. Typically, these processes occur in silos, making the need for mature, unified risk management that much more important. Join our conversation as we discuss the attributes of modern risk management programs, including better ways to strategically locate and prioritize risks, assess business risks, and mitigate current pain points for overwhelmed security teams.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modern Risk Management: Locating, Prioritizing, and Minimizing Risks to Your Business

March 18, 2021
5:30-6:45pm CT

SOUTH CENTRAL REGION: Arkansas, Louisiana, Oklahoma, Texas

ISE® VIP Hosts:

Mike Coogan

Mike Coogan
Senior Director, Cybersecurity
Waste Management
ISE® Central Executive Award Winner Finalist 2015
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

More organizations are turning to a modern Risk Management path, which allows them to approach the scope of risk and audits in scalable, dynamic ways. Accomplishing tasks like security assessments, risk communications and compliance in real time has never been more important given the speed and complexity of advanced cyberattacks. However, in order to achieve a modern approach to risk management, enterprise programs must integrate vital processes such as continuous optimization, automated risk-based prioritization and insights, and the automatic operationalization of security controls. Typically, these processes occur in silos, making the need for mature, unified risk management that much more important. Join our conversation as we discuss the attributes of modern risk management programs, including better ways to strategically locate and prioritize risks, assess business risks, and mitigate current pain points for overwhelmed security teams.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
After the Crisis: Recovering and Learning from Supply Chain Attacks

March 16, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Donna Nemecek

Donna Nemecek
Global Information Security Leader
Wells Fargo
ISE® Northeast Executive Award Finalist 2013

Supply Chain Risk Management (SCRM) is a shared responsibility between vendors and organizations, as demonstrated recently by the SUNBURST supply chain campaign. Organizations cannot shift risk management fully to vendors. Rather, they must also retain some ownership over ensuring SCRM security as well as be prepared to react internally whenever an incident affects supply chain integrity and related compromise. Whether organizations are dealing with the aftershocks of the SUNBURST breach directly or learning from it to prepare for similar attacks, like those involving ransomware, we will likely see increased calls to “Verify, then Trust” along with other newer security methods. Join our conversation as we discuss SRCM, how to react and recover from supply chain and firmware compromise, and further methods to ensure our firmware is not hiding additional vulnerabilities or threats out of sight from the rest of our security stack.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
A Full Cloud Platform for Continuous Global IT, Security, and Compliance Assessment

March 16, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Xavier Ashe
VP, Security Operations
Truist

Trina Ford
Corporate Vice President, Global CISO
AECOM
Biography

Revankar_Mehul

Mehul Revankar
VP, Product Management & Engineering VMDR
Qualys
Biography

The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

Cybersecurity and Infrastructure Security Agency’s (CISA) and the National Cyber Security Alliance (NCSA) March STOP. THINK. CONNECT.™ Campaign Partner Call:
Opening the Door to a Successful Cybersecurity Career for Women and Minorities

March 10, 2021
2:00-3:00pm ET

About the campaign
To learn more about participating in the program, contact StopThinkConnect@HQ.DHS.GOV

Moderator/Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Interest in the cybersecurity industry is growing for women and minorities, but entering the field and making the professional connections they need for a successful career is still a daunting prospect for many. The lack of representation in cybersecurity can make it seem like there are no resources or mentorship opportunities out there for women and minorities. Therefore, it’s important for current professionals to dispel this belief by sharing their knowledge and exchanging resources with newcomers to the field, such as TechBridge’s Technology Career Program, LinkedIn as a professional network builder and many others. Women and minorities need to be aware that not only can they open the door to a successful cybersecurity career but also that they will be welcomed and empowered once they cross the threshold. As a result, the International Consortium of Minority Cybersecurity Professionals (ICMCP) has partnered with CISA and NCSA to deliver this much-needed message during CISA’s invitation-only March STOP. THINK. CONNECT™ (STC) Campaign Partner Call. Join our conversation as we discuss the tools, programs and resources that women and minorities can harness to participate as prepared, innovative cybersecurity professionals as well as how they can take charge of their own career path.

ISE® COCKTAILS AND CONVERSATIONS
The Economic Benefits to Smarter Threat Intelligence and Risk Mitigation

March 9, 2021
5:30-6:45pm ET
4:30-5:45pm CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, Washington DC, West Virginia

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kevin McKenzie

Dr. Kevin McKenzie
VP & CISO
Dollar Tree Stores
ISE® Southeast Executive Award Winner 2013
ISE® North America Academic Executive Award Winner 2013

Biography

Our increasingly remote workforce needs access to applications and resources across various geographic regions, networks and devices. To keep employees working effectively, enterprises had to quickly implement new solutions, ease restrictions and policies and remove barriers to entry, leaving security teams the responsibility of protecting the enterprise against attacks that would take advantage of these changes. To do so, security teams need to collect meaningful threat intelligence, which is difficult to manage and even harder to implement. Even SOCs, which are better equipped for threat detection and response, are generally overwhelmed, its resources stretched and its experts expensive to find, train and retain. Fortunately, SOCs and threat hunting teams no longer have to perform threat intelligence piecemeal across multiple solutions whenever time allows. They now have the option to utilize a single pane of glass for intelligence, saving on both time and cost. Join our conversation as we discuss how security teams can harness a single platform to automate and operationalize threat intelligence to speed up threat detection and enable proactive defensive measures.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modern Risk Management: Locating, Prioritizing, and Minimizing Risks to Your Business

March 4, 2021
5:30-6:45pm CT
6:30-7:45pm ET

NORTH CENTRAL REGION: Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska, North Dakota, Ohio, South Dakota, Western Pennsylvania, Wisconsin

ISE® VIP Hosts:

Brenda Callaway

Brenda Callaway
Divisional Vice President, Information Security Risk Management
HCSC
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

More organizations are turning to a modern Risk Management path, which allows them to approach the scope of risk and audits in scalable, dynamic ways. Accomplishing tasks like security assessments, risk communications and compliance in real time has never been more important given the speed and complexity of advanced cyberattacks. However, in order to achieve a modern approach to risk management, enterprise programs must integrate vital processes such as continuous optimization, automated risk-based prioritization and insights, and the automatic operationalization of security controls. Typically, these processes occur in silos, making the need for mature, unified risk management that much more important. Join our conversation as we discuss the attributes of modern risk management programs, including better ways to strategically locate and prioritize risks, assess business risks, and mitigate current pain points for overwhelmed security teams.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Prepare for the Next Sunburst: Guarding Against Software Supply Chain Attacks

March 3, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Kunal Anand

Kunal Anand
CTO
Imperva
Biography

James Baird
VP & Chief Information Security Officer
International Market Centers
Biography

Betty Elliott
CISO
Freddie Mac
Biography

Even though enterprises have layered security controls, cyber attackers are getting around them by infiltrating open source and embedded software libraries. As a result, security teams are increasingly unable to discern beneficial application behavior and unwarranted, new behavior. Many of our security controls and tools are legacy based, only able to block known, malicious behavior which leaves emerging attacks going undetected for months, as was the case with the Sunburst attack. By targeting the software supply chain, cyber attackers can compromise not just the application but also the entire stack, including any owner or end user that interacts with it. Join our conversation as we discuss the nature of software supply chain attacks as well as how to guard applications against zero-day attacks and block unexpected activity via Runtime Application Self-Protection (RASP).

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® SALES AND MARKETING FIRESIDE WEBINAR: Security Members, Marketing Professionals and Sales Teams: Meeting in the Middle to Maximize Digital Engagement and Prepare for the Future

March 2, 2021
2:00 PM – 3:00 PM ET
11:00 AM – 12:00 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Andrew Bjerken
Global Chief Information Security & Privacy Officer
Catalina
ISE® Southeast Executive Award Winner 2020
ISE® Southeast People's Choice Award Winner 2020
ISE® North America Executive: Commercial Award Winner 2020

Biography

Dan Meacham
VP, Security and Operations
Legendary Entertainment
ISE® West Executive of the Year Award Winner 2020
ISE® West People's Choice Award Winner 2020
Biography

As we look forward to what 2021 has in store, we are all attempting to predict how the year will change, particularly from a sales and marketing perspective. So many techniques have shifted to a digital outreach mindset, but security professionals and vendors alike are experiencing online fatigue due to remote working and various meetings held over video calls. Keeping digital engagement and sales meetings interesting and worthwhile will be challenging but necessary if solution providers want to stand out from the crowd and if security professionals wish to find crucial tools and technology. On the other hand, in-person events and meetings will eventually make a return. Predicting when that will happen and being able to shift gears to accommodate both in-person and online sales and marketing will spell the difference between success and being caught unprepared. Security professionals have their own ideas of when this shift will happen, which marketing techniques work, how digital events can stay relevant and what changes will occur within their office culture moving forward. Join our conversation as we hear valuable insights and perspectives from leading cybersecurity executives about what awaits in 2021, allowing sales and marketing teams to maximize their current digital engagement and plan effective future, in-person outreach.

ISE® COCKTAILS AND CONVERSATIONS
After the Crisis: Recovering and Learning from Supply Chain Attacks

February 23, 2021
5:30-6:45pm PT
6:30-7:45pm MT

WEST COAST REGION: Alaska, Arizona, California, Colorado, Hawaii, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, Wyoming

Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Chuck Markarian

Chuck Markarian
CISO
PACCAR
ISE® West Executive of the Year Award Winner 2018
ISE® West People's Choice Award Winner 2018

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Supply Chain Risk Management (SCRM) is a shared responsibility between vendors and organizations, as demonstrated recently by the SUNBURST supply chain campaign. Organizations cannot shift risk management fully to vendors. Rather, they must also retain some ownership over ensuring SCRM security as well as be prepared to react internally whenever an incident affects supply chain integrity and related compromise. Whether organizations are dealing with the aftershocks of the SUNBURST breach directly or learning from it to prepare for similar attacks, like those involving ransomware, we will likely see increased calls to “Verify, then Trust” along with other newer security methods. Join our conversation as we discuss SRCM, how to react and recover from supply chain and firmware compromise, and further methods to ensure our firmware is not hiding additional vulnerabilities or threats out of sight from the rest of our security stack.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Getting Left of Breach With Human-Centric Cybersecurity

February 23, 2021
5:30-6:45pm ET
4:30-5:45 CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, West Virginia

Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Craig  Froelich

Brent Comstock
Sr. Director, Global Data & Endpoint Protection
ADP
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

In the era of the unbound enterprise, there is a mandate for a different perspective in approaching cybersecurity. Traditional approaches have put cybersecurity organizations in reaction mode for threats and breeches. The focus needs to shift to left of breach (or proactive mode), so cyber risks can be addressed before they cause major issues. With enterprises accelerating their migration to the cloud, employees and IT infrastructure are becoming more dispersed. The two constants that remain under the visibility and control of cybersecurity organizations are users and data. Cybersecurity needs to place both of those at the center of their security posture and pursue a human-centric approach that focuses on understanding the behaviors of each entity on the network. Join our conversation where we will discuss how a human-centric approach will allow organizations to better quantify behavior-associated risk and deploy automated countermeasures to protect the new edge that is everywhere and everyone.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
The Economic Benefits to Smarter Threat Intelligence and Risk Mitigation

February 18, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont

ISE® VIP Hosts:

Coryea_Chris

Chris Coryea
Chief Information Officer for Live & Event Content
NBCUniversal

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Our increasingly remote workforce needs access to applications and resources across various geographic regions, networks and devices. To keep employees working effectively, enterprises had to quickly implement new solutions, ease restrictions and policies and remove barriers to entry, leaving security teams the responsibility of protecting the enterprise against attacks that would take advantage of these changes. To do so, security teams need to collect meaningful threat intelligence, which is difficult to manage and even harder to implement. Even SOCs, which are better equipped for threat detection and response, are generally overwhelmed, its resources stretched and its experts expensive to find, train and retain. Fortunately, SOCs and threat hunting teams no longer have to perform threat intelligence piecemeal across multiple solutions whenever time allows. They now have the option to utilize a single pane of glass for intelligence, saving on both time and cost. Join our conversation as we discuss how security teams can harness a single platform to automate and operationalize threat intelligence to speed up threat detection and enable proactive defensive measures.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Regaining Visibility Into Risks and Reclaiming Control Over the Technology Supply Chain

February 18, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Brian Phillips Brian Phillips
Vice President, IT & Information Security
Macy's
Biography
Steinway_Dwayne

Scott Scheferman
Principal, Cyber Strategist
Eclypsium
Biography

Dané Smiley

Dané Smiley
Sr. Director, Information Security
Ameriprise Financial Services, Inc.

The past year has proven that Supply Chain Risk Management (SCRM) must become a top priority for many organizations. Our technology supply chain faces specific challenges involving risk, of which many affect devices long before they are delivered and unboxed by the eventual owner. For instance, code used in software, libraries and components may be reused in the supply chain even if the code contains vulnerabilities, which can affect laptops, printers, medical devices, servers, critical infrastructure and more. Many manufacturers’ components also include vulnerable or compromised code from a variety of third-party upstream vendors, meaning organizations may inherit these risks and firmware security issues—oftentimes unknowingly. Likewise, threats can infiltrate the supply chain in the form of updates, which can be slow to perform and even slower to fix if a vulnerability or threat is detected since doing so requires coordination between multiple parties. Addressing supply chain risk is a crucial undertaking that must be performed not only by individual enterprises but also at the industry level if we are to mitigate the damage a compromised supply chain can cause. Join our conversation as we discuss how to regain visibility into risks and reclaim control over your supply chain, so security teams can act confidently in verifying device integrity throughout the device lifecycle.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Small Security Teams With Big Attack Risks: Best Approaches for Protecting Your Organization

February 16, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Kathleen Mullin

Kathleen Mullin
Chief Information Security Officer
Healthmap Solutions

name

Michelle Stewart
Chief Information Security Officer
Safe-Guard Products

George Tubin

George Tubin
Director, Product Marketing
Cynet
Biography

Small security teams exist in enterprises of all sizes. Their cybersecurity needs and challenges are not so different from those of advanced SOCs or large cybersecurity divisions. As more companies digitize their critical assets and sensitive data, small security teams are charged with protecting their organizations with the same efficacy as large teams. To do more with less has become a necessary strategy but is one that can be difficult to achieve. Join our conversation as we discuss the unique challenges faced by small security teams to defend their organizations against cyberthreats along with best practices to achieve enterprise-grade protection with limited resources and budgets.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Recent Cyber Attacks Put Application Security Front and Center

February 11, 2021
5:30-6:45pm ET
4:30-5:45 CT

SOUTHEAST REGION: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, Washington, D.C., West Virginia

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Gene Scriven

Gene Scriven
Chief Information Security Officer
ACI Worldwide
ISE® Southeast People’s Choice Award Winner 2008
ISE® Southeast Executive Award Finalist 2008

Biography
T.E.N. Success Story

Application Security is specifically designed to work within applications to stop zero days on-prem and in the cloud. Cybercriminals and nation state actors are targeting applications with increased vigor, seeking to take over supply chains, networks and entire systems via lateral movement and other methods. To stop them, we can pivot and place application security as the front and center of our defense efforts. Join our conversation as we discuss the necessary tenets of application security, including how to prevent the loading or call outs of any malicious code as well as how to thwart any lateral movement.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Getting Left of Breach With Human-Centric Cybersecurity

February 10, 2021
5:30-6:45pm CT
6:30-7:45 ET

CENTRAL REGION: Alabama, Arkansas, Illinois, Iowa, Kansas, Kentucky, Louisiana, Minnesota, Mississippi, Missouri, Nebraska, North Dakota, Oklahoma, South Dakota, Tennessee, Texas, Wisconsin

ISE® VIP Hosts:

Belanger_Greg

Greg Belanger
Vice President, Cyber Defense
CBRE Holding, Inc.
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

In the era of the unbound enterprise, there is a mandate for a different perspective in approaching cybersecurity. Traditional approaches have put cybersecurity organizations in reaction mode for threats and breeches. The focus needs to shift to left of breach (or proactive mode), so cyber risks can be addressed before they cause major issues. With enterprises accelerating their migration to the cloud, employees and IT infrastructure are becoming more dispersed. The two constants that remain under the visibility and control of cybersecurity organizations are users and data. Cybersecurity needs to place both of those at the center of their security posture and pursue a human-centric approach that focuses on understanding the behaviors of each entity on the network. Join our conversation where we will discuss how a human-centric approach will allow organizations to better quantify behavior-associated risk and deploy automated countermeasures to protect the new edge that is everywhere and everyone.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
From Chaos to Clarity to Control

February 4, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Steinway_Dwayne

Dwayne Steinway
Chief Information Security Officer
Entercom
Biography

Organizations across the globe responded to government mandates enforcing strict work-from-home (WFH) orders for staff, creating a distributed workforce on an unprecedented scale. Two-fifths of employees are estimated to continue working remotely after the pandemic has receded, but working in this environment has uncovered an uncomfortable reality. We have critical security gaps everywhere that could seriously escalate cybersecurity risk. The chaos of this time has exposed our endpoint vulnerabilities, the increased risk of data spillage, and our unpatched personal devices to opportunistic malicious actors and attack vectors. We can no longer apply piecemeal solutions or follow past policies to achieve clarity and regain control over our endpoint-rich environment. Join our conversation as we discuss how to develop resilience and recover operations to stabilize our enterprises as well as plan for what’s going to happen next for organizational cybersecurity once the crisis passes.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
The Economic Benefits to Smarter Threat Intelligence and Risk Mitigation

February 3, 2021
5:30-6:45pm PT
6:30-7:45pm MT
2:30 PM – 3:45 PM HT

SOUTHWEST REGION: Arizona, Colorado, Hawaii, New Mexico, Nevada, Southern California (South Bay area and below) & Utah

ISE® VIP Hosts:

Ray Austad

Ray Austad
Director of Information Security and Risk Management
Farmers Insurance
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Our increasingly remote workforce needs access to applications and resources across various geographic regions, networks and devices. To keep employees working effectively, enterprises had to quickly implement new solutions, ease restrictions and policies and remove barriers to entry, leaving security teams the responsibility of protecting the enterprise against attacks that would take advantage of these changes. To do so, security teams need to collect meaningful threat intelligence, which is difficult to manage and even harder to implement. Even SOCs, which are better equipped for threat detection and response, are generally overwhelmed, its resources stretched and its experts expensive to find, train and retain. Fortunately, SOCs and threat hunting teams no longer have to perform threat intelligence piecemeal across multiple solutions whenever time allows. They now have the option to utilize a single pane of glass for intelligence, saving on both time and cost. Join our conversation as we discuss how security teams can harness a single platform to automate and operationalize threat intelligence to speed up threat detection and enable proactive defensive measures.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Getting Left of Breach With Human-Centric Cybersecurity

January 28, 2021
5:30-6:45pm PT
6:30-7:45pm MT
3:30-4:45pm AT
2:30-3:45pm HT

WEST REGION: Alaska, Arizona, California, Colorado, Hawaii, Idaho, Montana, Nevada, New Mexico, Oregon, Utah, Washington, Wyoming

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kimberly Trapani
Chief Security Officer
American Tire Distributors

In the era of the unbound enterprise, there is a mandate for a different perspective in approaching cybersecurity. Traditional approaches have put cybersecurity organizations in reaction mode for threats and breeches. The focus needs to shift to left of breach (or proactive mode), so cyber risks can be addressed before they cause major issues. With enterprises accelerating their migration to the cloud, employees and IT infrastructure are becoming more dispersed. The two constants that remain under the visibility and control of cybersecurity organizations are users and data. Cybersecurity needs to place both of those at the center of their security posture and pursue a human-centric approach that focuses on understanding the behaviors of each entity on the network. Join our conversation where we will discuss how a human-centric approach will allow organizations to better quantify behavior-associated risk and deploy automated countermeasures to protect the new edge that is everywhere and everyone.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Working From Anywhere: What It Means for Information Security and IT Pros

January 28, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Tarun Desikan
Co-founder and COO
Banyan Security
Biography

Adrian Dunne
Global Senior Director of IT
NextRoll, Inc.
Biography

Vince Parras
Manager, Information Security
Carta
Biography

Flexible, remote work styles were a growing trend even before the pandemic. Now, the influx has emphasized the importance of providing employees with secure and productive access no matter where they are working. VPNs, while useful, do not provide everything employees need to operate safely and effectively. Businesses require shifting to a modern approach for remote access and working from anywhere—a Zero Trust Access approach. Join our conversation as we discuss a CISO’s long-term security priorities to enable working from anywhere, including best practices for implementing Zero Trust Access.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR
Applying the Lessons of Cybersecurity’s Past to Change Our Future

January 26, 2021
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Speakers:

Leach_Chris

Chris Leach
Senior CISO Advisor
Cisco
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

The cybersecurity industry has undergone drastic changes over the last 30 years, and with it, the CISO role has adapted and evolved. Job responsibilities have expanded as security threats continue to grow in both strength and number. Despite all the shifts we’ve experienced with our security environments, we are still relying on dated security methods and allotting our budgets using narrow silos. If we want to prepare for the future, we need to review our past choices and determine our next steps to plan for the future, whether that’s to adopt MFA, achieve greater response time through automation, extend Zero Trust to applications or accomplish another worthwhile goal. Join our conversation as we reflect on the CISO’s path and discuss how the lessons of our past can inform the security decisions we will make to conquer future challenges.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
From Chaos to Clarity to Control

January 21, 2021
5:30-6:45pm CT
6:30-7:45 ET

NORTH CENTRAL REGION: Illinois, Indiana, Iowa, Kansas, Kentucky, Michigan, Minnesota, Missouri, Nebraska, North Dakota, Ohio, South Dakota, Western Pennsylvania, Wisconsin

ISE® VIP Hosts:

Ricardo Lafosse

Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company
ISE® Central Executive of the Year Award Winner 2019
ISE® North America Executive: Financial Award Finalist 2019

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations across the globe responded to government mandates enforcing strict work-from-home (WFH) orders for staff, creating a distributed workforce on an unprecedented scale. Two-fifths of employees are estimated to continue working remotely after the pandemic has receded, but working in this environment has uncovered an uncomfortable reality. We have critical security gaps everywhere that could seriously escalate cybersecurity risk. The chaos of this time has exposed our endpoint vulnerabilities, the increased risk of data spillage, and our unpatched personal devices to opportunistic malicious actors and attack vectors. We can no longer apply piecemeal solutions or follow past policies to achieve clarity and regain control over our endpoint-rich environment. Join our conversation as we discuss how to develop resilience and recover operations to stabilize our enterprises as well as plan for what’s going to happen next for organizational cybersecurity once the crisis passes.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
From Chaos to Clarity to Control

January 20, 2021
5:30-6:45pm PT
6:30-7:45 MT

NORTHWEST REGION: Alaska, Northern California, Idaho, Montana, Oregon, Washington, Wyoming

ISE® VIP Hosts:

Stuart Gibson

Stuart Gibson
Director, Information Security
Starbucks Corporation

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations across the globe responded to government mandates enforcing strict work-from-home (WFH) orders for staff, creating a distributed workforce on an unprecedented scale. Two-fifths of employees are estimated to continue working remotely after the pandemic has receded, but working in this environment has uncovered an uncomfortable reality. We have critical security gaps everywhere that could seriously escalate cybersecurity risk. The chaos of this time has exposed our endpoint vulnerabilities, the increased risk of data spillage, and our unpatched personal devices to opportunistic malicious actors and attack vectors. We can no longer apply piecemeal solutions or follow past policies to achieve clarity and regain control over our endpoint-rich environment. Join our conversation as we discuss how to develop resilience and recover operations to stabilize our enterprises as well as plan for what’s going to happen next for organizational cybersecurity once the crisis passes.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Getting Left of Breach With Human-Centric Cybersecurity

January 19, 2021
5:30-6:45pm ET

NORTHEAST REGION: Connecticut, Delaware, Maine, Massachusetts, Maryland, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont and Washington, D.C.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Jim Routh

Jim Routh
Board Member, Advisor and Former CISO
Industry-Leading Enterprises
ISE® Northeast Executive Award Winner 2007
ISE® North America Executive Award Winner 2014 - Health Care Category
ISE® Northeast Executive Award Finalist 2014
ISE® Luminary Leadership Award Winner 2016

Biography

In the era of the unbound enterprise, there is a mandate for a different perspective in approaching cybersecurity. Traditional approaches have put cybersecurity organizations in reaction mode for threats and breeches. The focus needs to shift to left of breach (or proactive mode), so cyber risks can be addressed before they cause major issues. With enterprises accelerating their migration to the cloud, employees and IT infrastructure are becoming more dispersed. The two constants that remain under the visibility and control of cybersecurity organizations are users and data. Cybersecurity needs to place both of those at the center of their security posture and pursue a human-centric approach that focuses on understanding the behaviors of each entity on the network. Join our conversation where we will discuss how a human-centric approach will allow organizations to better quantify behavior-associated risk and deploy automated countermeasures to protect the new edge that is everywhere and everyone.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
From Chaos to Clarity to Control

January 13, 2021
5:30-6:45pm CT
6:30-7:45 ET

SOUTH CENTRAL REGION: Arkansas, Louisiana, Oklahoma, Texas

ISE® VIP Hosts:

Marc Crudgington

Marc Crudgington
CISO, SVP Information Security
Woodforest National Bank
ISE® Central Executive Award Finalist 2019
ISE® North America Executive: Financial Award Winner 2019

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations across the globe responded to government mandates enforcing strict work-from-home (WFH) orders for staff, creating a distributed workforce on an unprecedented scale. Two-fifths of employees are estimated to continue working remotely after the pandemic has receded, but working in this environment has uncovered an uncomfortable reality. We have critical security gaps everywhere that could seriously escalate cybersecurity risk. The chaos of this time has exposed our endpoint vulnerabilities, the increased risk of data spillage, and our unpatched personal devices to opportunistic malicious actors and attack vectors. We can no longer apply piecemeal solutions or follow past policies to achieve clarity and regain control over our endpoint-rich environment. Join our conversation as we discuss how to develop resilience and recover operations to stabilize our enterprises as well as plan for what’s going to happen next for organizational cybersecurity once the crisis passes.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.