ISE® FIRESIDE WEBINAR
Enhancing Business Agility: Amplifying the Power of Your Cloud and Security Program through Deep Observability
WATCH VIDEO ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
Jim Mandelbaum
Cloud Architect and Field CTO
Gigamon
Biography
Paul Farley
CVP, Deputy Chief Information Security Officer
NCR Voyix
Biography
Today’s modern cloud-first organizations are continuing to invest in advancing digital transformation initiatives to heighten business agility, while tackling an ever-more dangerous threat landscape in an uncertain economy. Join us for an engaging conversation on how to increase application performance, exceed expectations to realize the full potential of hybrid and multi-cloud infrastructures while cutting costs, and reducing complexity. Our panelists will also explore how to amplify the power of traditional security and observability tools with actionable network-derived intelligence and insights to eliminate blind spots, maintain visibility into all data-in-motion – including East-West encrypted and container traffic as well as improving fidelity and proactively mitigate compliance risk.
ISE® FIRESIDE WEBINAR
Ransomware Roulette: Overcoming the Most Dangerous Cyberthreat
WATCH VIDEO ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
Robert Pace
VP, Information Security & CISO
Invitation Homes
ISE® West Executive Award Finalist 2022
ISE® West People's Choice Award Winner 2023
ISE® Central-West Executive Award Finalist 2024
Biography
Shelbi Rombout
Deputy Chief Information Security Officer
U.S. Bank
Biography
Ransomware is one of the most dangerous threats businesses and consumers face today. Whether you are an individual or a Fortune 500 company, the experience of getting locked out of your system, having your files encrypted, and being subjected to threats and demands for payment can be harrowing. Join us for an insightful discussion where in a ransomware world traditional security software and classic endpoint protections are no longer enough and how we can better educate enterprises in preventing them. Walk away with a set of actionable next steps to build and execute a ransomware detection and response program. We will also lift the veil on how ransomware criminals operate in an effort to garner a better understanding of these attacks and ways to spot and stop them before it is too late.
ISE® PRIVATE DINNER
Zero Trust: Migrating From Conceptual Model to Comprehensive Framework
5:30pm - 8:30pm ET
Little Alley Steak
3500 Lenox Road NE, Suite 100
Atlanta, GA 30326
Curley Henry
Vice President and Deputy Chief Information Security Officer
Southern Company
Biography
Most organizations are now engaging in a Zero Trust journey as they prepare for more flexible, hybrid models of working. Protections around identity and devices are necessary and must cover both managed and unmanaged users, assets, resources and workstations. The lack of full visibility into these unagentable and unmanaged areas will prevent you from realizing the extent of your attack surface, leaving you unable to implement effective Zero Trust policies. Join our conversation where we will discuss how to take your Zero Trust roadmap from a conceptual model to a comprehensive framework that protects data; enables the principles of network isolation, segmentation and security; automates and orchestrates controls and processes; and more.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
5:30pm - 8:30pm MT
Elements at Sanctuary Camelback Mountain
5700 East McDonald Drive
Paradise Valley, AZ 85253
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® FIRESIDE WEBINAR
Delivering Zero Trust with a SASE Platform
WATCH VIDEO ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
Jim Fulton
VP Product Marketing & Analyst Relations
Forcepoint
Biography
Harshal Mehta
VP, Chief Information Security Officer
CWT
ISE® West Executive Award Finalist 2023
Biography
SASE is a journey where capabilities can be selected one capability at a time, delivering better control over how people get to business applications and use sensitive data. When built with Zero Trust principles throughout, it delivers data security everywhere your business goes. The result is a security stack that’s easier to manage and an organization that’s much safer, with increased productivity and a better user experience. Join us for an engaging discussion on how Zero Trust Data Security relies on a philosophy of “never trust, always verify.” We will also explore how to hone in our most important asset: securing your company’s data while aligning with today’s board room focus in lowering your operating costs bringing more value into the enterprise.
ISE® PRIVATE DINNER
Simplifying Security with Data-first SASE
Michael Boucher
Executive Director, Global Information Security
JLL
Biography
In the age of the hybrid workforce where people are working anywhere with data that is everywhere, organizations must enable safe access to resources. This means delivering access to websites, the cloud and private apps whether employees are working from home, in the office, on the road or over any device. Add in new technologies like ChatGPT and other Generative AIs that hold the promise of tremendous improvements in productivity but also bring forth the threat of loss of control of sensitive information. With the world becoming a very different place, join us for an engaging discussion to explore how you can simplify security and provide consistent security for users anywhere, who are accessing digital resources everywhere. We will also explore the best practices of going down the path to SASE one step at a time, effectively deploying capabilities or swapping legacy products on a case-by-case basis. Additionally, we will share how to attain a best-in-class data security program, a best-in-class data security program that implements Zero Trust principles efficiently.
ISE® HOLIDAY COCKTAILS AND CONVERSATIONS
Empowering the Enterprise with Deep Observability
5:30pm - 6:45pm PT
6:30pm – 7:45pm MT
WEST AND MOUNTAIN REGIONS: Alaska, Arizona, California, Colorado, Hawaii, Idaho, Montana, Nebraska, Nevada, New Mexico, North Dakota, Oregon, South Dakota, Utah, Washington, Wyoming
Marci McCarthy
CEO and President
T.E.N.
Biography
Jim Mandelbaum
Cloud Architect and Field CTO
Gigamon
Biography
Kannan Perumal
CISO
Applied Materials
Biography
Modern enterprises are accelerating their digital transformation initiatives to gain agility and maintain a competitive edge. No matter how many times you’ve heard it, the cliché “you can’t secure what you can’t see” still remains true. As organizations move to increasingly complex hybrid and multi-cloud infrastructures, the need to gain and maintain visibility into all data-in-motion – including East-West, encrypted and container traffic – becomes more critical. Join us for an engaging discussion on how the deep observability enables organizations to realize the full transformational promise of the cloud and set the stage for delivering significant value. With the uncertainty of today’s economy, we will also explore how to minimize the expenses that are associated with managing hybrid and multi-cloud IT infrastructures by identifying and eliminating security and performance blind spots, breaking down silos, and containing runaway complexity.
Attendees of the ISE® Cocktails and Conversations are eligible to earn 1 CPE upon its conclusion.
ISE® PRIVATE DINNER
Reducing Security OpEx and Generating ROI. Microsegmentation with MFA to the Rescue!
5:30pm - 8:30pm ET
Fleming's Prime Steakhouse & Wine Bar Tysons Corner
1960 A Chain Bridge Rd
Mclean, VA 22102-4089
Frank Aiello
SVP, Chief Information Security Officer
MAXIMUS
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016
Biography
Today’s data-driven, hybrid environments has become an increasing target for hackers as the traditional firewall on the perimeter and EDR are no longer enough. While security leaders are being asked to do more with less, they are also challenged that virtualization and cloud initiatives have caused impairment with their visibility and an inability to maintain strong policy enforcement controls. Pair this with the high costs of legacy and traditional network segmentation when firewalls are expensive, deployment is lengthy, and ongoing maintenance heavily relies on professional services for continuous, manual rule updates. Join us for an engaging discussion on how microsegmentation can be deployed with minimal maintenance to generate an exponential cost savings. We will also explore how this approach can apply when MFA is deployed on every port, protocol, and application and be regarded as a key defense mechanism against stealthy attacks and data breaches.
ISE® PRIVATE DINNER
Simplifying Security with Data-first SASE
Jason Abraham
Global Security Operations Leader
Verizon
Biography
In the age of the hybrid workforce where people are working anywhere with data that is everywhere, organizations must enable safe access to resources. This means delivering access to websites, the cloud and private apps whether employees are working from home, in the office, on the road or over any device. Add in new technologies like ChatGPT and other Generative AIs that hold the promise of tremendous improvements in productivity but also bring forth the threat of loss of control of sensitive information. With the world becoming a very different place, join us for an engaging discussion to explore how you can simplify security and provide consistent security for users anywhere, who are accessing digital resources everywhere. We will also explore the best practices of going down the path to SASE one step at a time, effectively deploying capabilities or swapping legacy products on a case-by-case basis. Additionally, we will share how to attain a best-in-class data security program, a best-in-class data security program that implements Zero Trust principles efficiently.
ISE® PRIVATE DINNER
Simplifying Security with Data-first SASE
5:30pm - 8:30pm MT
Eddie V’s Prime Seafood
15323 N. Scottsdale Road
Scottsdale, AZ 85254
Dennis McDonald
Chief Information Security Officer
Jack Henry and Associates
Biography
In the age of the hybrid workforce where people are working anywhere with data that is everywhere, organizations must enable safe access to resources. This means delivering access to websites, the cloud and private apps whether employees are working from home, in the office, on the road or over any device. Add in new technologies like ChatGPT and other Generative AIs that hold the promise of tremendous improvements in productivity but also bring forth the threat of loss of control of sensitive information. With the world becoming a very different place, join us for an engaging discussion to explore how you can simplify security and provide consistent security for users anywhere, who are accessing digital resources everywhere. We will also explore the best practices of going down the path to SASE one step at a time, effectively deploying capabilities or swapping legacy products on a case-by-case basis. Additionally, we will share how to attain a best-in-class data security program, a best-in-class data security program that implements Zero Trust principles efficiently.
ISE® PRIVATE DINNER
How Can We Protect Our Organizations from Web Threats Now, and Tomorrow
Almon Tse
Chief Information Security Officer
Saks Fifth Avenue
Biography
Web threats have continued to grow in frequency, impact and sophistication – with the potential for a step-change in severity as generative AI techniques become more accessible to attackers of all skill levels. Will today’s ‘best practice’ controls be able to keep up? This rapidly-evolving threat calls for a fundamental mindshift in cybersecurity. Join us for a forward-looking discussion on promising approaches for addressing these threats, exploring for example, shifts from detection to prevention and allow listing rather than block listing for internet access. Can new approaches succeed, can we match the attackers’ step-change with a greater leap of our own, and what hurdles will need to be overcome?
ISE® FIRESIDE WEBINAR FOR SALES & MARKETING PROFESSIONALS
The Insider View of How to Maximize Cybersecurity Sales Opportunities When Being Told to Do More With Less
WATCH VIDEO ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
Xavier Ashe
SVP, Cybersecurity Operations
Truist
Biography
Kevin Morrison
VP, Chief Information Security Officer
Driven Brands
ISE® Southeast People’s Choice Award Winner 2015
Biography
With today’s ever evolving threat landscape paired with an uncertain economy and volatile geo-political world, no security leader would dare work in vacuum. The most successful security leaders stay ahead of the curve while aligning with their business goals and what their security team members require to protect the enterprise. Join us for engaging discussion to hear first-hand how to stand out in a crowded playing field, receive valuable knowledge about the best ways to connect with future clients and foster long-term relationships with them. We will also explore what the top buying priorities are for the 2024 - 2025 term and will get an insider view of how to maximize sales opportunities when security executives are being told to do more with less.
ISE® FIRESIDE WEBINAR
Why a Data-first Approach to SASE Matters
WATCH VIDEO ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
Sujeet Bambawale
Vice President and Chief Information Security Officer
7- Eleven
Biography
Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography
Peter Tse
Information Security Officer
CTBC Bank, New York Branch
Biography
For years, “digital transformation” has been all the rage. Now, people work anywhere with data everywhere. Join us for an engaging conversation on how to increase workforce productivity, even with BYOD, so that your enterprise can be seamless, faster, competitive – and secure! We will also explore how and where to cut costs, improve the economies-of-scale and reduce risk by replacing fragmented and outdated infrastructures. Our discussions will also reveal how a Zero Trust approach to security can stop threats and continuously protect sensitive data in cloud, web, private apps.
ISE® WEST PRIVATE WELCOME DINNER
5:30pm - 8:30pm CT
Del Frisco's Double Eagle Steakhouse Plano
5905 Legacy Drive
Suite A-120
Plano, TX 75024
Tanweer Surve
CTO Cloud Control Management
Wells Fargo
Biography
The Risk vs. Reward of Generative AI: Securing Your Most Sensitive Data
Security and technology leaders, from the boardroom to the war room, are grappling with the potential security risks that generative AI represents. Yet despite the potential for leaking sensitive data, business leaders recognize that they must find a way to harness the transformative power that the technology represents. Gather with local technology leaders for an intimate dinner and interactive discussion sponsored by Cyera, where we will discuss the strategic risk-management challenges enterprises are facing with the adoption of generative AI, and how to effectively manage this generational shift. Discussion topics will include:
- The strategic impact generative AI is having on enterprises, and discuss the risks and rewards the technology represents
- Technologies that allow security leaders to harness the positive potential while mitigating the most damaging risks
- The technology management principles that should be embraced to advance enterprise innovation and business transformation
ISE® WEST SUMMIT AND AWARDS 2023
The ISE® WEST Summit and Awards 2023 will be held on October 24, 2023 at The Dallas/Plano Marriott at Legacy Town Center in Plano, TX. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the nation to discuss and share insights into today's issues and solutions.
ISE® PRIVATE DINNER
Simplifying Security with Data-first SASE
5:30pm - 8:30pm ET
Eddie V’s Prime Seafood
4400 West Boy Scout Boulevard
Tampa, FL 33607
Duane Dobbins
Business Information Security Officer
New York Life Insurance Company
Biography
In the age of the hybrid workforce where people are working anywhere with data that is everywhere, organizations must enable safe access to resources. This means delivering access to websites, the cloud and private apps whether employees are working from home, in the office, on the road or over any device. Add in new technologies like ChatGPT and other Generative AIs that hold the promise of tremendous improvements in productivity but also bring forth the threat of loss of control of sensitive information. With the world becoming a very different place, join us for an engaging discussion to explore how you can simplify security and provide consistent security for users anywhere, who are accessing digital resources everywhere. We will also explore the best practices of going down the path to SASE one step at a time, effectively deploying capabilities or swapping legacy products on a case-by-case basis. Additionally, we will share how to attain a best-in-class data security program, a best-in-class data security program that implements Zero Trust principles efficiently.
ISE® PRIVATE DINNER
Enabling Your Security Investments to Work in Concert as One Coordinated Symphony
5:30pm - 8:30pm ET
Fleming's Prime Steakhouse & Wine Bar
2525 Ponce De Leon Blvd
Coral Gables, FL 33134
As threats grow more sophisticated and span across a greater variety of attack vectors, ensuring consistent detection across your environment has never been more critical. In today’s hybrid, multi-vendor, multi-vector landscape, complexity is the biggest challenge. Security teams must protect an ever-expanding ecosystem, running operations across dozens of tools with inconsistent integration. IoT and hybrid work have led to an expanded attack surface. Phishing, malware, and ransomware are doubling and even tripling year over year. At the same time, businesses are more hyper-connected than ever before. A security breach to one company can impact a company’s suppliers, partners, customers and even whole sectors of the economy.
Join us for an engaging discussion on how the new normal calls for cyber security resilience — the ability to protect the integrity of every aspect of the business to withstand unpredictable threats or changes and emerge stronger. Additionally, we will explore from an executive perspective how an XDR solution that is open, extensible and cloud-first, will benefit from unified detection and event correlation across your environment instead of adding additional layers of complexity.
ISE® PRIVATE DINNER
Transforming the Enterprise with Pervasive, Empowering Deep Observability
Modern enterprises are accelerating their digital transformation initiatives to gain agility and maintain a competitive edge. No matter how many times you’ve heard it, the cliché “you can’t secure what you can’t see” still remains true. As organizations move to increasingly complex hybrid and multi-cloud infrastructures, the need to gain and maintain visibility into all data-in-motion – including East-West, encrypted and container traffic – becomes more critical. Join us for an engaging discussion on how the deep observability enables organizations to realize the full transformational promise of the cloud and set the stage for delivering significant value. With the uncertainty of today’s economy, we will also explore how to minimize the expenses that are associated with managing hybrid and multi-cloud IT infrastructures by identifying and eliminating security and performance blind spots, breaking down silos, and containing runaway complexity.
ISE® PRIVATE DINNER
Reducing Security OpEx and Generating ROI. Microsegmentation with MFA to the Rescue!
Today’s data-driven, hybrid environments has become an increasing target for hackers as the traditional firewall on the perimeter and EDR are no longer enough. While security leaders are being asked to do more with less, they are also challenged that virtualization and cloud initiatives have caused impairment with their visibility and an inability to maintain strong policy enforcement controls. Pair this with the high costs of legacy and traditional network segmentation when firewalls are expensive, deployment is lengthy, and ongoing maintenance heavily relies on professional services for continuous, manual rule updates. Join us for an engaging discussion on how microsegmentation can be deployed with minimal maintenance to generate an exponential cost savings. We will also explore how this approach can apply when MFA is deployed on every port, protocol, and application and be regarded as a key defense mechanism against stealthy attacks and data breaches.
ISE® PRIVATE DINNER
Zero Trust: Migrating From Conceptual Model to Comprehensive Framework
Mike Lamberg
VP, CISO
Ion Group
Biography
Most organizations are now engaging in a Zero Trust journey as they prepare for more flexible, hybrid models of working. Protections around identity and devices are necessary and must cover both managed and unmanaged users, assets, resources and workstations. The lack of full visibility into these unagentable and unmanaged areas will prevent you from realizing the extent of your attack surface, leaving you unable to implement effective Zero Trust policies. Join our conversation where we will discuss how to take your Zero Trust roadmap from a conceptual model to a comprehensive framework that protects data; enables the principles of network isolation, segmentation and security; automates and orchestrates controls and processes; and more.
INFOSEC NASHVILLE
Ensuring Trust and Data Privacy in a ChatGPT and AI World
Marci McCarthy
CEO and President
T.E.N.
Biography
Nathan Kennedy
AVP of Cybersecurity
Molina Healthcare
Biography
Joey Johnson
CISO
Premise Health
ISE® Southeast Executive of the Year Award Winner 2017
ISE® North America Executive: Health Care Award Finalist 2017
Biography
When many people hear the phrase “AI in the workplace,” they may think of being replaced by robots or machines. While machines may not take over the world, AI technologies, such as ChatGPT, have become more prevalent in our daily lives. For security executives, these next-generation, automated technologies have become a savior and nemesis when tackling an ever-evolving threat landscape and end-user profile. Our industry experts will explore strategies and measures for ensuring trust in AI systems while safeguarding data privacy. Furthermore, this panel will explore how stakeholders can work together to build a trustworthy and privacy-conscious AI ecosystem by focusing on transparency, accountability, privacy by design, user empowerment, and the development of legal frameworks. We will also explore how behavioral analysis requires a multi-layered defense inclusive of AI and machine learning to protect against fileless and other advanced attacks and how data can be safeguarded against the insider threat.
ISE® PRIVATE DINNER
Doing More With Less: Improving Your Security Posture on a Budget
Mark Burnette
Practice Leader
LBMC Advisory Services
Biography
ISE® Southeast Executive Award Winner 2005
Every security executive faces the challenge of keeping their business secure while managing budget constraints in the face of a rapidly expanding threat landscape. Not every organization is positioned with all the right skills, or the scale, required to provide 24x7x365 defense across an ever-expanding set of security technologies. Join us for an engaging discussion on how to do more with less, enhance your security posture and accelerate your incident response. We will also deep dive on how your organization can ruthlessly mitigate cyber threats before they begin to represent a real problem and continually shape an ongoing plan for cyber resiliency.
ISE® FIRESIDE WEBINAR
Is ChatGPT (and other AIs) the New Shadow IT?: Enable the AI/ChatGPT World Without the Risk
WATCH ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
Mike Towers
Former Chief Digital Trust Officer
Takeda Pharmaceuticals
ISE® Northeast Executive of the Year Award Winner 2015
ISE® North America Executive: Health Care Award Winner 2015
ISE® Northeast Executive Award Winner 2020
ISE® North America Executive: Health Care Award Winner 2020
Biography
In the race to compete leveraging generative artificial intelligence (AI) and tools like ChatGPT, a long-standing problem is reemerging with renewed force – Shadow IT. Join us for an engaging discussion on how you can enable your organization to leverage this revolutionary technology, without the risk. AI tools could potentially expose organizations to various security and privacy risks because employees are turning to them for an array of applications, from drafting sales and marketing emails to analyzing sensitive financial data. During our program, we will explore how enterprises can make ChatGPT and other AIs safe to use to include how to limit access to groups/users authorized to test Ais. We will also share the best practices in how to coach users on how to use the properly the platform while developing data security policies can block sensitive info in queries. For organizations that would like to take their fight against AI-related risks to the next level, we will discuss the available frameworks and the ongoing collaboration with the wider industry and government agencies to develop standards and best practices for the responsible use of generative AI.
ISE® PRIVATE DINNER
Protecting Your Organization From Web Threats Now, and Tomorrow
5:30pm - 8:30pm CT
Bob’s Steak and Chop House
5760 Legacy Drive
Suite B-1
Plano, TX 75024
Michael Dent
Chief Information Security Officer
Fairfax County Government
ISE® North America Executive Award Finalist 2014 - Academic/Public Sector Category
ISE® North America Executive Award Winner 2015 - Academic/Public Sector Category
Biography
As generative AI techniques become more accessible to attackers of all skill levels, traditional detection-based security techniques may struggle with an increase in both the sophistication of attacks and the proliferation of signature permutations for malicious code. This rapidly-evolving threat calls for a fundamental mindshift in cybersecurity, moving from detection-based protection and response algorithms to a prevention-based approach, whereby non-trusted content is not given the opportunity to attempt to compromise the corporate network. Join us for a forward-looking discussion on the threat that generative AI poses for cybersecurity defenders and whether prevention, rather than detection, is the optimal approach to cybersecurity in this environment.
ISE® PRIVATE DINNER
Simplifying Security with Data-first SASE
In the age of the hybrid workforce where people are working anywhere with data that is everywhere, organizations must enable safe access to resources. This means delivering access to websites, the cloud and private apps whether employees are working from home, in the office, on the road or over any device. Add in new technologies like ChatGPT and other Generative AIs that hold the promise of tremendous improvements in productivity but also bring forth the threat of loss of control of sensitive information. With the world becoming a very different place, join us for an engaging discussion to explore how you can simplify security and provide consistent security for users anywhere, who are accessing digital resources everywhere. We will also explore the best practices of going down the path to SASE one step at a time, effectively deploying capabilities or swapping legacy products on a case-by-case basis. Additionally, we will share how to attain a best-in-class data security program, a best-in-class data security program that implements Zero Trust principles efficiently.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
5:30pm - 8:30pm ET
Charley’s Steak House & Market Fresh Fish
4444 West Cypress Street
Tampa, FL 33607
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
5:30pm - 8:30pm PT
John Howie Steak
11111 NE 8th Street
Suite 125
Bellevue, WA 98004
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
5:30pm - 8:30pm PT
The Sea by Alexander's Steakhouse
4269 El Camino Real
Palo Alto, CA 94306
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® PRIVATE DINNER
The Most Important Shift for Cybersecurity Leaders in a Generation
5:30pm - 8:30pm ET
Little Alley Steak
3500 Lenox Road NE
Suite 100
Atlanta, GA 30326
Xavier Ashe
SVP, Cybersecurity Operations
Truist
Biography
Everyone’s talking about ChatGPT and Generative AI tools as when something is so pervasive that it becomes the dominant topic of conversation in business and technology. In many of the conversations inside and outside of the board room, security leaders are grappling with the decision to allow or block ChatGPT given the risk of leaking sensitive data and how to effectively manage this generational shift without adding to the chaos. Join us for engaging conversation on how enterprises can safely enable the use of ChatGPT with application access control, real-time user coaching, and data protection. We will also explore how to create a culture of empowerment where enterprises can embrace this technology without putting the business at risk.
ISE® FIRESIDE WEBINAR
Data, Devices and People Are Everywhere: Preventing Sensitive Data Loss Across ALL Egress Channels
August 22, 2023
Watch Video on Demand
Marci McCarthy
CEO and President
T.E.N.
Biography
Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography
Eric S. Green
Security Operations
TikTok
Biography
Travis Farral
VP & CISO
Archaea Energy
Biography
It is hard to ignore that the lines between home and office being blurred and unmanaged devices leaving your company’s infrastructure vulnerable. “Democratization of Data, making data available to everyone all the time across websites, cloud apps, and private apps adds a whole level of challenge to the ‘risk reduction equation’. A simpler approach is warranted as the old portfolio of point products wasn’t built for this type of extended enterprise.
Join us for insightful discussion on how to unlock simplicity to bring forth comprehensive data security cross more channels into one set of policies, one console, one agent. We will also explore how to combine Zero Trust principles with a SASE architecture and advanced security to protect data across any website, cloud application, and web-based private applications to keep your data secure everywhere your people work and anywhere your data resides.
ISE® PRIVATE DINNER
Zero Trust: Migrating From Conceptual Model to Comprehensive Framework
5:30pm - 8:30pm ET
Del Frisco's Double Eagle Steakhouse (Seaport)
250 Northern Avenue
Suite 200
Boston, MA 02210
David Billeter
Chief Information Security Officer
Travelport
ISE® North America Commercial Executive Award Winner 2011
Biography
Most organizations are now engaging in a Zero Trust journey as they prepare for more flexible, hybrid models of working. Protections around identity and devices are necessary and must cover both managed and unmanaged users, assets, resources and workstations. The lack of full visibility into these unagentable and unmanaged areas will prevent you from realizing the extent of your attack surface, leaving you unable to implement effective Zero Trust policies. Join our conversation where we will discuss how to take your Zero Trust roadmap from a conceptual model to a comprehensive framework that protects data; enables the principles of network isolation, segmentation and security; automates and orchestrates controls and processes; and more.
ISE® PRIVATE DINNER
Reeling in the Spiraling Cost of Data Growth
5:30pm - 8:30pm CT
Fearing's Restaurant - The Ritz Carlton, Dallas
2121 McKinney Avenue
Dallas, TX 75201
Ajay Gupta
SVP & Chief Information Security Officer
AmerisourceBergen
Biography
Security and observability teams need centralized visibility into event data to identify and automate responses to vulnerabilities and deliver a flawless end-user experience. However, security and performance data often remain siloed in point solutions, compelling companies to duplicate and transfer data to traditional SIEM or log management solutions. Using these solutions as a data lake becomes cost-prohibitive since they were developed in the pre-cloud era and fail to leverage the latest innovations.
Join us as we discuss how enterprises can explore modern data lake solutions to capture and unify all data leading to better outcomes while significantly reducing costs when your data volume may be exceeding the pace of your budget.
ISE® PRIVATE DINNER
Doing More With Less: Improving Your Security Posture on a Budget
Every security executive faces the challenge of keeping their business secure while managing budget constraints in the face of a rapidly expanding threat landscape. Not every organization is positioned with all the right skills, or the scale, required to provide 24x7x365 defense across an ever-expanding set of security technologies. Join us for an engaging discussion on how to do more with less, enhance your security posture and accelerate your incident response. We will also deep dive on how your organization can ruthlessly mitigate cyber threats before they begin to represent a real problem and continually shape an ongoing plan for cyber resiliency.
ISE® FIRESIDE WEBINAR
The Evolution – More Intelligence and Insight for More Advanced Protection
Marci McCarthy
CEO and President
T.E.N.
Biography
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
Thomas Dager
Vice President, Chief Information Security Officer
Archer Daniels Midland (ADM)
Biography
Ryan Reynolds
Senior VP, Head of Cyber Risk Oversight
U.S. Bank
Biography
As the number, type, and sophistication of threats evolve, organizations require more intelligence and insight than traditional endpoint security provides. More threat actors are shifting their aim to weaknesses created by user behavior, poor cybersecurity hygiene, and shadow IT. The dramatic increase in the types of endpoint devices—including smartphones, tablets, wearable devices, and more—has overpowered first-generation endpoint security. The increasing number of potentially vulnerable endpoints can also exhaust security team resources that are relying on traditional cybersecurity defenses. Depending on separate software processes to handle the security and security management of endpoints can result in potential disconnects. And maintaining and updating blacklists of malicious codes requires more and more resources. And these legacy products still leave organizations susceptible to zero-day exploits, data theft threatening to slip through among too many false positives.
Join us for an engaging discussion on how next-generation, automated technologies can examine every process on every device to counter potential attacks have become necessary to better lock down endpoint security while investigating every phase of an attack campaign. We will also explore how behavioral analysis requires a multi-layered defense inclusive of AI and machine learning to protect against fileless and other advanced attacks.
ISE® PRIVATE DINNER
Reeling in the Spiraling Cost of Data Growth
Security and observability teams need centralized visibility into event data to identify and automate responses to vulnerabilities and deliver a flawless end-user experience. However, security and performance data often remain siloed in point solutions, compelling companies to duplicate and transfer data to traditional SIEM or log management solutions. Using these solutions as a data lake becomes cost-prohibitive since they were developed in the pre-cloud era and fail to leverage the latest innovations.
Join us as we discuss how enterprises can explore modern data lake solutions to capture and unify all data leading to better outcomes while significantly reducing costs when your data volume may be exceeding the pace of your budget.
ISE® PRIVATE DINNER
With More Collaboration Comes More Phishing: Tackling the Weaponization of Communication Apps
5:30pm - 8:30pm ET
Eddie V's Prime Seafood
101 South Tryon Street
Suite 100
Charlotte, NC 28280
Eileen Bridges
Senior Vice President
Sr. Cyber Business Information Security Officer, Wholesale Technology
Truist
Biography
Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
ISE® PRIVATE DINNER
Reeling in the Spiraling Cost of Data Growth
Vikrant Arora
Chief Information Security Officer
Hospital for Special Surgery
ISE® North America Executive Award Finalist 2014 - Health Care Category
ISE® Northeast Executive of the Year Award Winner 2016
ISE® North America Executive Award Winner 2016 - Health Care Category
Biography
Security and observability teams need centralized visibility into event data to identify and automate responses to vulnerabilities and deliver a flawless end-user experience. However, security and performance data often remain siloed in point solutions, compelling companies to duplicate and transfer data to traditional SIEM or log management solutions. Using these solutions as a data lake becomes cost-prohibitive since they were developed in the pre-cloud era and fail to leverage the latest innovations.
Join us as we discuss how enterprises can explore modern data lake solutions to capture and unify all data leading to better outcomes while significantly reducing costs when your data volume may be exceeding the pace of your budget.
ISE® PRIVATE DINNER
Bridging the Gap of Converged IT/OT in an Ever Evolving Threat Landscape
Ken Foster
Head of Global Architecture
Adient
ISE® East People's Choice Award Winner 2022
Biography
The convergence of Information Technology (IT) and Operational Technology (OT) has become a critical focus for businesses with dual infrastructures, as it presents new opportunities and challenges. One serious consideration is how cybersecurity plays in this this converged environment. Join us for an engaging discussion on how this critical focus for businesses can present new opportunities and challenges as well as organizational and cultural considerations. Additionally, we will explore the best practices for integrating cyber security into IT and OT systems where operational efficiency and optimization can be garnered in the modern business environment.
ISE® PRIVATE DINNER
With More Collaboration Comes More Phishing: Tackling the Weaponization of Communication Apps
Ely Turkenitz
Sr. Manager
Santa Clara County / TSS (Technology Services and Solutions)
Biography
Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
ISE® PRIVATE DINNER
Enabling Your Security Investments to Work in Concert as One Coordinated Symphony
David Nolan
CIO & CISO
Aaron's
ISE® East Executive Award Finalist 2023
ISE® East People's Choice Award Winner 2023
Biography
As threats grow more sophisticated and span across a greater variety of attack vectors, ensuring consistent detection across your environment has never been more critical. In today’s hybrid, multi-vendor, multi-vector landscape, complexity is the biggest challenge. Security teams must protect an ever-expanding ecosystem, running operations across dozens of tools with inconsistent integration. IoT and hybrid work have led to an expanded attack surface. Phishing, malware, and ransomware are doubling and even tripling year over year. At the same time, businesses are more hyper-connected than ever before. A security breach to one company can impact a company’s suppliers, partners, customers and even whole sectors of the economy.
Join us for an engaging discussion on how the new normal calls for cyber security resilience — the ability to protect the integrity of every aspect of the business to withstand unpredictable threats or changes and emerge stronger. Additionally, we will explore from an executive perspective how an XDR solution that is open, extensible and cloud-first, will benefit from unified detection and event correlation across your environment instead of adding additional layers of complexity.
ISE® PRIVATE DINNER
Protecting What Really Matters Most—Your Data and Applications
5:30pm - 8:30pm ET
Truluck's Ocean's Finest Seafood and Crab
777 Brickell Avenue
Miami, FL 33131
In today’s digital world, applications have become mission-critical for organizations looking to drive rapid growth and to stay connected with customers. As technology evolves, the attack surface becomes more sophisticated offering threat actors a range of vectors to target and compromise. Combined with stagnating budgets, fluctuating economic trends and limited team sizes, these challenges cause security leaders to feel the pressure to consider the increased threat landscape to include sensitive data that's exposed through APIs.
Join this insightful discussion to participate in a conversation about how security leaders can enable and empower their teams to safeguard sensitive data using modern security platforms that protect your applications, continuously scan for APIs that expose sensitive data and shield them, and provide automation tools that let you achieve increasingly complex tasks without growing your team. We will also explore how a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database is essential to reducing the risks created by third-party code.
ISE® PRIVATE DINNER
Doing More With Less: Improving Your Security Posture on a Budget
5:30pm - 8:30pm CT
Bob’s Steak and Chop House
5760 Legacy Drive, Suite B-1
Plano, TX 75024
Shamoun Siddiqui
VP, CISO
Neiman Marcus
Biography
Every security executive faces the challenge of keeping their business secure while managing budget constraints in the face of a rapidly expanding threat landscape. Not every organization is positioned with all the right skills, or the scale, required to provide 24x7x365 defense across an ever-expanding set of security technologies. Join us for an engaging discussion on how to do more with less, enhance your security posture and accelerate your incident response. We will also deep dive on how your organization can ruthlessly mitigate cyber threats before they begin to represent a real problem and continually shape an ongoing plan for cyber resiliency.
ISE® PRIVATE DINNER
With More Collaboration Comes More Phishing: Tackling the Weaponization of Communication Apps
Peter Tse
Information Security Officer
CTBC Bank, New York Branch
Biography
Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
ISE® PRIVATE DINNER
Explaining the Unknown: How to Communicate Evasive Threats to the C-Suite
5:30pm - 8:30pm MT
Mastro's City Hall Steakhouse
6991 E. Camelback Road
Scottsdale, AZ 85251
Robert Wahl
VP, Chief Information Security Officer
PetSmart
Biography
For years, communicating effectively with the C-suite and board of directors has been an ongoing exercise for security leaders and their teams. While we haven’t reached nirvana, tremendous strides have been made. However, there are still significant communication challenges that present themselves when it comes to certain topics, such as the single biggest unknown cybersecurity threat; Highly Evasive Adaptive Threats (HEAT). While ransomware tends to make headlines and capture your C-suite’s attention, it’s HEAT attacks that make those possible. Join us for an insightful discussion where we explore what HEAT attacks are and how they drastically increase business risk, but most important, what can be done about them. We will also explore how to maximize security investments in the face of economic downturns and how to augment existing security stacks to prevent HEAT attacks.
ISE® PRIVATE DINNER
Transforming the Enterprise with Pervasive, Empowering Deep Observability
5:30pm - 8:30pm CT
Smith & Wollensky - Marina City
318 North State Street
Chicago, IL 60654
Modern enterprises are accelerating their digital transformation initiatives to gain agility and maintain a competitive edge. No matter how many times you’ve heard it, the cliché “you can’t secure what you can’t” see still remains true. As organizations move to increasingly complex hybrid and multi-cloud infrastructures, the need to gain and maintain visibility into all data-in-motion – including East-West, encrypted and container traffic – becomes more critical. Join us for an engaging discussion on how the deep observability enables organizations to realize the full transformational promise of the cloud and set the stage for delivering significant value. With the uncertainty of today’s economy, we will also explore how to minimize the expenses that are associated with managing hybrid and multi-cloud IT infrastructures by identifying and eliminating security and performance blind spots, breaking down silos, and containing runaway complexity.
ISE® EAST PRIVATE WELCOME DINNER
Cyber-Resiliency: Harden your Data Security Posture to Ensure Compliance Across Your Hybrid Cloud
For today’s enterprise, security and privacy represent both competitive advantages and prerequisites for doing business. This has made data security a long-standing priority, but an ongoing challenge. Thwarting a wide range of attack vectors across an expansive and continuously evolving threat surface requires a fresh approach in today's modern, cloud era. Join us for an insightful discussion on how security teams can harden your data security posture to eliminate sensitive data breaches. We will explore how security leaders can stay on top of your evolving data landscape using new methods for continuously detecting new or changing data. In addition, we will deep dive into how developing deep data context gives your teams confidence to apply the right controls, maturing your zero trust architecture and assuring compliance and ransomware resilience across your cloud estate.
ISE® East Summit and Awards 2023
The ISE® East Summit and Awards 2023 will be held on May 4, 2023 at The Whitley Hotel in Atlanta, GA. The ISE® East Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the nation to discuss and share insights into today's issues and solutions.
Details
ISE® FIRESIDE WEBINAR
Refine The Wheel – Crafting An Intentional And Goal Oriented Cloud Security Strategy That Tackles The Unknown Threat
Watch Video on Demand
Kevin Gowen
Chief Information Security Officer
Synovus Financial Corporation
ISE® East Executive Award Winner 2022
Biography
Marci McCarthy
CEO and President
T.E.N.
Biography
Tanweer Surve
CTO Cloud Control Management
Wells Fargo
Biography
For many security teams embarking on a multi-year cloud transformation journey, the expectation is to hit the ground running before the paint is even dry. But the evolving threat landscape can make it difficult to get started. Join our panel of cyber security thought leaders as they outline strategies and hone in on tactics for creating a cloud security plan that will modernize and simplify your security stack. The panel will also explore how emergent AI systems like ChatGPT and GPT4 will introduce new opportunities and risks in your cloud security work.
ISE® VIP PROGRAMS DURING RSA™ CONFERENCE 2023
Once again, T.E.N. via the ISE® VIP Programs will proudly be at the RSA® Conference with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference. ISE® VIP Programs include signature luncheons and exclusive VIP receptions in evenings.
ISE® VIP PRIVATE DINNER
Zero to SIEM in Seconds: Modernize Your Security Operations by Empowering SOC Automation
Marci McCarthy
CEO and President
T.E.N.
Biography
Ian Reid
SVP Group Cyber
Truist
Biography
Today’s attack surface is continuously expanding due to hybrid and multi-cloud infrastructures and more cloud-based applications. Security operations are having difficulties in scaling and managing the volume of data and variety of security tools due to resource constraints and escalating costs. This leads to limited visibility, manual detection, and slow investigation efforts leading to delayed response to complex targeted attacks. Join us for an insightful dinner discussion on how security leaders can adopt an analytics-driven approach that goes beyond current SIEM, XDR and other SOC solutions to reduce alert fatigue, manual efforts, and inadequate response. We will explore the best practices associated with how to improve threat detection, investigation, and response (TDIR) for security teams.
ISE® VIP RECEPTION
Sensitive Dark Data: Capturing the Elusive Risk
Joe Bennett
Senior Vice President, Chief Information Officer
Adient
Biography
Kevin Coppins
CEO & President
Spirion
Biography
Marshall Heilman
Board Member
Spirion
Biography
Nathan Kennedy
AVP of Cybersecurity
Molina Healthcare
Biography
Chris McFarland
Vice President, Chief Information Security Officer (CISO)
Abercrombie & Fitch Co.
Biography
Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Board Member, Spirion
Biography
Multi-cloud networks, new AI applications, and unstructured data systems are often added without the security team’s knowledge, expanding the attack surface without adherence to security policies. While cybersecurity tools have matured and are more capable of detecting threats and vulnerabilities, improving data protection with data discovery and classification is an ever more important priority. Complicating the situation further, regulations such as PCI DSS, HIPAA, GDPR, and U.S. state laws such as the CCPA mandate the protection of sensitive and personal information. At the end of the day, you can’t protect what you don’t know you have. It is time to capture the elusive risk of sensitive dark data.
You’re invited to an engaging evening of networking, best practice sharing, and wine tasting with your executive peers to discuss how to optimize your efforts for security, privacy, and compliance. And no matter how strong your data privacy and security efforts are, planning for and having knowledge of accurate data discovery is essential to protecting your enterprise.
ISE® VIP RECEPTION
Raise Your Spirits - Be Protected from the Unexpected
Medha Bhalodkar
CISO, Enterprise IT Risk Officer
Columbia University
ISE® North America Executive Award Winner 2015 - Academic/Public Sector Category
ISE® North America Executive Award Winner 2016 - Academic/Public Sector Category
ISE® Northeast Executive Award Finalist 2018
Biography
Gary Hayslip
Director of Information Security (CISO)
SoftBank Group
ISE® West Executive of the Year Award Winner 2015
ISE® North America People's Choice Award Winner 2015
Biography
Marci McCarthy
CEO and President
T.E.N.
Biography
Join us for this by-invitation-only gathering to connect with your executive peers on how end-to-end security with threat visibility brings security resilience across entire the network. An engaging evening, executive guests will also enjoy chef curated dishes, delicious cocktails, and an exclusive bourbon/whiskey tasting from Bourbon expert, Tom Fischer.
Sharing his in-depth knowledge of bourbon and whiskey, Tom Fischer will entertain us with spirited stories as we walk through a hand-selected flight of spirits. This exclusive event promises to turn you into a huge bourbon/whiskey aficionado as we enjoy a private dinner reception at Waterbar, widely recognized for setting new standards of sustainability, variety and excellence in dining.
ISE® FIRESIDE WEBINAR
THE SEQUEL - More on How Collaboration Comes More Phishing Because Cyber Criminals are Upping their Threat Game in a Big Way
Watch Video on Demand
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography
Dr. Yonesy F. Núñez
Chief Information Security Officer
The Depository Trust & Clearing Corporation (DTCC)
ISE® East Executive Award Winner 2023
Biography
We heard and listened that there is so much more to cover in how collaboration tools like Microsoft Teams, Google Docs and Slack being an integral part of everyday working life in today’s hyperconnected world but they are not designed with security in mind. Join us for an insightful discussion as we deep dive into how phishers can now attack via a variety of methods and techniques into your supply chain with the ultimate intent of getting past your own company’s protections. We will also delve into the range of security gaps and most active cyber threats that are associated with these collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will explore how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also continue how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
ISE® PRIVATE DINNER
Unlock Data From Privacy Constraints to Avoid Disruption and Empower Innovation
5:30pm - 8:30pm ET
McCormick & Schmick's (Uptown Location)
200 S Tryon Street
Charlotte, NC 28202
Globalization investments that have built your business are now at risk from the growing complexity of sovereignty, localization, and privacy requirements. Operating at a global scale means sensitive data must be able to move and be processed across complex legal, corporate, geo-political, and regulatory boundaries on a limitless variety of infrastructure and applications. Join us for an engaging discussion on how to overcome these constraints by exploring a new approach that uses simple technology foundations that are built to achieve compliance across an entire enterprise and without borders.
ISE® PRIVATE DINNER
Explaining the Unknown: How to Communicate Evasive Threats to the C-Suite
5:30pm - 8:30pm CT
Truluck's Ocean's Finest Seafood & Crab
2401 McKinney Avenue
Dallas, TX 75201
Paul Reyes
Chief Information Security Officer and VP of Cyber Security, Risk, and Compliance
Vistra Corp.
Biography
For years, communicating effectively with the C-suite and board of directors has been an ongoing exercise for security leaders and their teams. While we haven’t reached nirvana, tremendous strides have been made. However, there are still significant communication challenges that present themselves when it comes to certain topics, such as the single biggest unknown cybersecurity threat; Highly Evasive Adaptive Threats (HEAT). While ransomware tends to make headlines and capture your C-suite’s attention, it’s HEAT attacks that make those possible. Join us for an insightful discussion where we explore what HEAT attacks are and how they drastically increase business risk, but most important, what can be done about them. We will also explore how to maximize security investments in the face of economic downturns and how to augment existing security stacks to prevent HEAT attacks.
ISE® PRIVATE DINNER
With More Collaboration Comes More Phishing: Tackling the Weaponization of Communication Apps
5:30pm - 8:30pm PT
Seastar Restaurant and Raw Bar
205 108th Avenue NE
Bellevue, WA 98004
Bill Boni
Retired Senior Vice President
Information Security
T-Mobile USA
ISE® Central Executive Award Winner 2007
ISE® North America Commercial Executive Award Finalist 2007
ISE® Luminary Leadership Award Winner 2015
Biography
Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
ISE® PRIVATE DINNER
Transforming the Enterprise with Pervasive, Empowering Deep Observability
Joe Bennett
Senior Vice President, Chief Information Officer
Adient
Biography
Modern enterprises are accelerating their digital transformation initiatives to gain agility and maintain a competitive edge. No matter how many times you’ve heard it, the cliché “you can’t secure what you can’t see" still remains true. As organizations move to increasingly complex hybrid and multi-cloud infrastructures, the need to gain and maintain visibility into all data-in-motion – including East-West, encrypted and container traffic – becomes more critical. Join us for an engaging discussion on how the deep observability enables organizations to realize the full transformational promise of the cloud and set the stage for delivering significant value. With the uncertainty of today’s economy, we will also explore how to minimize the expenses that are associated with managing hybrid and multi-cloud IT infrastructures by identifying and eliminating security and performance blind spots, breaking down silos, and containing runaway complexity.
ISE® FIRESIDE WEBINAR
Leading the Charge in Managing Cloud Security Risks as a CISO
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Andy Ellis
Advisory CISO
Orca Security
Biography
Max Garcia
CISO, Digital First Banking
NCR Voyix
Biography
Chris McFarland
Vice President, Chief Information Security Officer (CISO)
Abercrombie & Fitch Co.
Biography
The financial climate has shifted, making an intentional cloud security budgeting strategy more important than ever. As the CISO, it’s your responsibility to enable security while keeping your eyes on the big picture. Join us for an engaging discussion as we unpack four budget scenarios your organization may be facing: tightening, business as usual, more funding, or even an unknown budget. We will explore how each situation requires different approaches, allowing you to walk away with clear steps you can take to reach a state of security and preparedness.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® PRIVATE DINNER
Explaining the Unknown: How to Communicate Evasive Threats to the C-Suite
Daniel Goldenberg
Director of Information Security
Plymouth Rock Assurance
Biography
For years, communicating effectively with the C-suite and board of directors has been an ongoing exercise for security leaders and their teams. While we haven’t reached nirvana, tremendous strides have been made. However, there are still significant communication challenges that present themselves when it comes to certain topics, such as the single biggest unknown cybersecurity threat; Highly Evasive Adaptive Threats (HEAT). While ransomware tends to make headlines and capture your C-suite’s attention, it’s HEAT attacks that make those possible. Join us for an insightful discussion where we explore what HEAT attacks are and how they drastically increase business risk, but most important, what can be done about them. We will also explore how to maximize security investments in the face of economic downturns and how to augment existing security stacks to prevent HEAT attacks.
ISE® PRIVATE DINNER
Ensuring SaaS Security Without Disrupting Business Productivity
Andy Ellis
Operating Partner
YL Ventures
Biography
SaaS applications have become deeply embedded in every business function within forward thinking organizations, from sales and marketing to R&D. They are designed to facilitate business productivity and efficiency and empower business users to adopt them at scale without involving IT. The downside is that security teams are left without visibility into the often-indiscriminate adoption of cloud services, risky SaaS-to-SaaS integrations, ungoverned user identities and privileges, SaaS misconfigurations, and the external over-sharing of data. Join us for an engaging discussion as we explore how to mitigate these SaaS risks and share best practices on how security teams can engage with business users on proper SaaS application security hygiene without impeding business productivity or the velocity of SaaS adoption.
Additionally, T.E.N. will be providing a car service that is unique to the event for each reconfirmed executive. This will ensure a safe method of transportation to and from the event for all of our guests.
ISE® PRIVATE DINNER
Explaining the Unknown: How to Communicate Evasive Threats to the C-Suite
Branndon Kelley
Sr. Vice President Strategy & Innovation
Chief Strategy Officer (CSO)
American Municipal Power
Biography
For years, communicating effectively with the C-suite and board of directors has been an ongoing exercise for security leaders and their teams. While we haven’t reached nirvana, tremendous strides have been made. However, there are still significant communication challenges that present themselves when it comes to certain topics, such as the single biggest unknown cybersecurity threat; Highly Evasive Adaptive Threats (HEAT). While ransomware tends to make headlines and capture your C-suite’s attention, it’s HEAT attacks that make those possible. Join us for an insightful discussion where we explore what HEAT attacks are and how they drastically increase business risk, but most important, what can be done about them. We will also explore how to maximize security investments in the face of economic downturns and how to augment existing security stacks to prevent HEAT attacks.
ISE® PRIVATE DINNER
Protecting What Really Matters Most—Your Data and Applications
Michael Dent
Chief Information Security Officer
Fairfax County Government
ISE® North America Executive Award Finalist 2014 - Academic/Public Sector Category
ISE® North America Executive Award Winner 2015 - Academic/Public Sector Category
Biography
In today’s digital world, applications have become mission-critical for organizations looking to drive rapid growth and to stay connected with customers. As technology evolves, the attack surface becomes more sophisticated offering threat actors a range of vectors to target and compromise. Combined with stagnating budgets, fluctuating economic trends and limited team sizes, these challenges cause security leaders to feel the pressure to consider the increased threat landscape to include sensitive data that's exposed through APIs.
Join this insightful discussion to participate in a conversation about how security leaders can enable and empower their teams to safeguard sensitive data using modern security platforms that protect your applications, continuously scan for APIs that expose sensitive data and shield them, and provide automation tools that let you achieve increasingly complex tasks without growing your team. We will also explore how a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database is essential to reducing the risks created by third-party code.
ISE® PRIVATE DINNER
Transforming the Enterprise with Pervasive, Empowering Deep Observability
James Carpenter
CISO, CTO
Texas Scottish Rite Hospital for Children
ISE® Central People's Choice Award Winner 2009
Biography
Modern enterprises are accelerating their digital transformation initiatives to gain agility and maintain a competitive edge. No matter how many times you’ve heard it, the cliché “you can’t secure what you can’t” see still remains true. As organizations move to increasingly complex hybrid and multi-cloud infrastructures, the need to gain and maintain visibility into all data-in-motion – including East-West, encrypted and container traffic – becomes more critical. Join us for an engaging discussion on how the deep observability enables organizations to realize the full transformational promise of the cloud and set the stage for delivering significant value. With the uncertainty of today’s economy, we will also explore how to minimize the expenses that are associated with managing hybrid and multi-cloud IT infrastructures by identifying and eliminating security and performance blind spots, breaking down silos, and containing runaway complexity.
TedxMcfarlandYouth HOSTED BY GeorgiaFIRST Robotics CTSO Officers
Recapturing the Competitive Edge on the Global Stage: Does STEM Give Us That Advantage?
2:00pm - 7:00pm ET
Atlanta International School - Secondary School Building
2890 N. Fulton Drive NE
Atlanta, GA 30305
Marci McCarthy
CEO and President
T.E.N.
Biography
An event focused on presenting a wide array of topics to discuss current practices and how change can help, show off ground-breaking innovations to propel us forward, and a whole other variety of topics to inspire those who are looking to make a change.
ISE® PRIVATE DINNER
Putting Customer Trust at the Center Point of Competition
Bob Varnadoe
VP, Technology Risk Management
Kaiser Permanente
ISE® Southeast Executive Award Finalist 2018
ISE® East Executive Award Finalist 2023
Biography
It’s no secret that trust is the cornerstone on which all lasting relationships are built. With information literally at our fingertips from anywhere and anytime, customers, partners and employees alike can freely move from task to the next via the toggle of an app, a swipe or click of a button. With the digital age being front and center bringing forth a plethora of competitive advantages and a new threat landscape, protecting the information flow is essential to preserving brand reputation and ensuring trust. Join us for an engaging discussion on why enterprises across every vertical will need to prioritize data privacy and security to safeguard their relationships with customers by being transparent about the dangers of data in the digital age. We will also explore the challenges that associated with an exponential rise in data, share the best practices for business process alignment to keep the data safe, and what platforms are available for securing your data whether on-premise and in the cloud.
ISE® FIRESIDE WEBINAR
With More Collaboration Comes More Phishing: How Cyber Criminals are Upping their Threat Game in a Big Way.
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography
Dr. Yonesy F. Núñez
Chief Information Security Officer
The Depository Trust & Clearing Corporation (DTCC)
ISE® East Executive Award Winner 2023
Biography
Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® PRIVATE DINNER
Ensuring SaaS Security Without Disrupting Business Productivity
5:30pm - 8:30pm ET
Del Frisco's Double Eagle Steakhouse
250 Northern Ave.
Suite 200
Boston, MA 02210
Andy Ellis
Advisory CISO
Orca Security
Biography
SaaS applications have become deeply embedded in every business function within forward thinking organizations, from sales and marketing to R&D. They are designed to facilitate business productivity and efficiency and empower business users to adopt them at scale without involving IT. The downside is that security teams are left without visibility into the often-indiscriminate adoption of cloud services, risky SaaS-to-SaaS integrations, ungoverned user identities and privileges, SaaS misconfigurations, and the external over-sharing of data. Join us for an engaging discussion as we explore how to mitigate these SaaS risks and share best practices on how security teams can engage with business users on proper SaaS application security hygiene without impeding business productivity or the velocity of SaaS adoption.
ISE® PRIVATE DINNER
Building Digital Trust – a Security Leadership Perspective
Peter Tse
Information Security Officer
CTBC Bank, New York Branch
Biography
In an era of data proliferation, supply chain convergence, and an expanding attack surface, how are CISOs and security leaders responding? Join us for an engaging discussion on how enterprises are adapting their approaches to build digital trust and resilience both inside and outside the business.
Additionally, T.E.N. will be providing a car service that is unique to the event for each reconfirmed executive. This will ensure a safe method of transportation to and from the event for all of our guests.
ISE® PRIVATE DINNER
The Stakes Rise as Lateral Movement is the New Cyber Battleground
5:30pm - 8:30pm ET
LOCATION CHANGE
The Palm6705-B Phillips Place Court
Charlotte, NC 28210
Drake Cody
Head of Global Cybersecurity Operations
Gallagher
Enterprises are facing an unprecedented level of threat and complexity as they operate in today’s multi-cloud and digital world. Consequently, the stakes in security continue to rise and lateral security has become the new battleground. Join us for an engaging discussion on how to best defend against the broadening attack surface where security teams can garner an improved level of visibility across workloads, devices, users and networks to detect, protect, and respond to cyber threats. We will also explore how security teams can make more informed decisions to detect and stop lateral movement of attacks that are stymied due to the limited context of their systems.
ISE® PRIVATE DINNER
Staying Ahead of the Curve: How Cybersecurity Executives Can Focus on Preventing Evasive HEAT Attacks
5:30pm - 8:30pm PT
The Sea by Alexander's Steakhouse
4269 El Camino Real
Palo Alto, CA 94306
Kannan Perumal
CISO
Applied Materials
Biography
Just like any business or industry, cybercriminals are continually on the lookout for ways to innovate and remain relevant as trends and market dynamics evolve. The shift to remote and hybrid work and acceleration of cloud adoption has transformed the daily routines for most workers, with most of it revolving around the browser. It only makes sense from an attacker’s perspective to cast a line where the majority of fish are swimming because they can evade detection from traditional security tools. It then comes as no surprise that Highly Evasive Adaptive Threats (HEAT) represent an important evolution in attacker techniques to exploit key gaps in traditional security defenses. Join us for a forward-thinking discussion on how organizations can focus on three key tenets to limit their susceptibility to these types of attacks: shifting from a detection to a proactive mindset, stopping threats before they hit the endpoint, and incorporating advanced anti-phishing and isolation capabilities. We will also explore how HEAT attacks evade existing security defenses where hackers exploit the weaknesses of the existing security stack, are building sophisticated delivery mechanisms to evade detection as well as how to prevent them.