Upcoming Events

ISE® PRIVATE DINNER
Scaling Security Across the Enterprise

September 2, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Registration
Dennis Dickstein

Dennis Dickstein
Chief Privacy and Information Security Officer
UBS Wealth Management Americas
Biography

Application security threats continue to evolve at a rapid pace. At the same time, the size of the standard enterprise has also grown, extending beyond traditional borders and storage methods, leveraging different frameworks such as cloud, mobile, web and embedded devices. While this expansion allows for greater connectivity and the potential for further growth, it also opens up new avenues of attack. As the size and scope of the applications expand, your security application model and protocols must be scaled to ensure applications remain secure and protected against potential threats. Join our conversation to learn how you can proactively build security into the earliest stages of your software development lifecycle, enhance your application security program and scale security across your organization and to third party companies.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

September 10, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
788 W. Sam Houston Parkway North
Houston, TX 77024
Registration
Russell Stalters

Russell Stalters
Director, Information & Data Management
BP

Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 10, 2015
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Registration
David Hannigan

David Hannigan
MVP, Security Engineering and Application Security
Capital One

Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

September 15, 2015
5:30pm - 8:30pm
Fleming's Prime Steakhouse
4322 W Boy Scout Blvd
Tampa, FL 33607
Registration
Dave Summitt

Dave Summitt
Director of Information Security
Moffitt Cancer Center

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
The Cyber Defense Knowledge Exchange; Hunting Cyber Attacks

September 16, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
920 2nd Avenue South
Minneapolis, MN 55402
Registration

Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 17, 2015
5:30pm - 8:30pm
The Capital Grille
2502 E Camelback Rd, Suite 199
Phoenix, AZ 85016
Registration

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

September 22, 2015
5:30pm - 8:30pm
LB Steak
334 Santana Row, Suite 1000
San Jose, CA 95128
Registration

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

September 23, 2015
5:30pm - 8:30pm
Trump International Hotel & Tower Toronto
Bay Street Room, 30th Floor
325 Bay Street
Toronto, ON M5H 4G3
Registration

Ray Archer

Ray Archer
Senior VP and Chief Information Security Officer
Scotiabank
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Keeping the Crown Jewels Under Lock and Key: Protecting Your Enterprise from SAP Vulnerabilities

September 23, 2015
5:30pm - 8:30pm
Fleming's Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Registration

Virtually every SAP application is vulnerable to financial fraud, sabotage or espionage from cyber-attacks targeting these business-critical systems. They are the lifeblood of the world’s largest companies as they manage their most sensitive information and critical processes. Despite housing an organization’s “crown jewels,” SAP systems and their application layer are not protected by traditional security solutions. Join our conversation to learn more about the most critical SAP security vulnerabilities, public exploits and defense strategies.

ISE® PRIVATE DINNER
Cybersecurity in the Era of Cloud: Best Practices To Secure Data In the Cloud

September 24, 2015
5:30pm - 8:30pm
Dallas Chop House
1717 Main St #100
Dallas, TX 75201
Registration

Cloud applications like Salesforce, Google Apps, Box and Office 365 are becoming the preferred model of application delivery. With critical data now in the cloud, how do you balance the business needs of collaboration and productivity while keeping sensitive data safe? What new risks and threats should be considered to avoid making the headlines? How do you build in-house cloud security competency, and extend security and governance to cloud applications? Join our conversation to explore best practices of how to gain visibility, governance and protection of cloud applications, and how new tools/technologies like cloud access security brokers can help.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 28, 2015
5:30pm - 8:30pm
Lockeland Table
1520 Woodland St.
Nashville, TN 37206
Registration

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

September 29, 2015
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, OH 43215

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs. If you are interested in attending, please contact Deb Jones or Kate Parnell.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 30, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
65 East Wacker Place
Chicago, IL 60601
Registration

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® Northeast Private Welcome Dinner
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management

October 7, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY
Registration

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

ISE® Northeast Executive Forum and Awards 2015

The ISE® Northeast Executive Forum and Awards 2015 will be held on October 8, 2015 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

November 5, 2015
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
250 Northern Ave
Boston, MA 02210
Registration
Larry Wilson

Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 -
Academic/Public Sector Category

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® North America Leadership Summit and Awards 2015

The ISE® North America Leadership Summit and Awards will be held November 10-11, 2015 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details