Upcoming Events

ISE® CENTRAL PRIVATE WELCOME DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

May 6, 2015
5:30pm - 8:30pm
Dallas Fish Market
1501 Main St.
Dallas, TX 75201
Registration
Ajay Gupta

Ajay Gupta
Chief Information Security Officer
Concentra
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® Central Executive Forum and Awards 2015

The ISE® Central Executive Forum and Awards 2015 will be held on May 7, 2015 at the Sheraton Downtown in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

May 13, 2015
5:30pm - 8:30pm
The Capital Grille
2502 East Camelback Road
Phoenix, AZ 85016
Registration
Jason Lish

Jason Lish
Vice President of Security Technology & Operations
Charles Schwab & Company
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

May 13, 2015
5:30pm - 8:30pm
The Chicago Chop House
60 W.Ontario St.
Chicago, IL 60654
Registration

Brian Klement
Former Managing Director of Information Security
NYSE Euronext
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

May 14, 2015
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, Ohio 43215
Registration

Carla Donev
Director, IT Risk Management
Cardinal Health, Inc.
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Know Thy Enemy: Using Intruder Analytics to Detect Compromised Users

May 19, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Registration

Jose Alvir
Senior Director
Pfizer, Inc.

Time is not an abundant resource when an intruder is in your network, yet speed is a necessity when identifying and addressing incidents involving compromised users. Your team must be able to quickly and efficiently detect incidents, investigate their credibility and respond immediately to disrupt the attack before damage is done. Think minutes – not hours – as response time is one of the most substantial factors that will influence the impact and loss caused by a breach. The use of intruder analytics and can arm your team with knowledge of attacks and intruder behavior to more rapidly identify malicious actors and initiate mitigation. Join our conversation to learn more about incorporating intruder analytics into your cyber security program and discover best practices for detecting and addressing compromised user based attacks.

ISE® PRIVATE DINNER
Secrets to Securing the Dynamic, Complex Enterprise Environment

June 3, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
260 S Broad Street
Philadelphia, PA 19102
Registration
 

As they grow and become more dynamic, enterprise environments become increasingly complex, making it difficult for businesses to understand and control the risks presented by their web-facing assets such as web applications, mobile applications and network infrastructure. Historically, this problem has been compounded by vulnerability discovery solutions that breed a culture of compliance and fail to accurately portray an adversary’s view of the environment. A new approach is needed to align actual and perceived risks to business operations, revenue, and reputation. Join our conversation to explore how continuous assessment, scalability, visibility and control are key to securing your complex enterprise network and ensuring success for your business.

ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security

June 16, 2015
5:30pm - 8:30pm
The Capital Grille
4740 Jefferson St.
Kansas City, MO 64112
Registration
 

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 30, 2015
5:30pm - 8:30pm
The Capital Grille
301 5th Avenue
Pittsburgh, PA 15222
Registration
 

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® West Executive Forum and Awards 2015

The ISE® West Executive Forum and Awards 2015 will be held on August 20, 2015 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2015

The ISE® Northeast Executive Forum and Awards 2015 will be held on October 8, 2015 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2015

The ISE® North America Leadership Summit and Awards will be held November 10-11, 2015 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details