Upcoming Events

ISE® PRIVATE DINNER
Modernize Your Enterprise: Orchestrating a Secure, Heterogeneous Network

July 28, 2015
5:30pm - 8:30pm
The Capital Grille
500 Crescent Ct.
Dallas, TX 75201
Registration
General

Adam Maslow
Director, Security and Compliance
JCPenney

Networks have become progressively more complex and require constant transformation as new threats emerge. With network environments in a state of flux, security teams need to address continuing modernization and business operation’s needs, such as supporting applications teams, migrating data centers, troubleshooting connectivity problems and preparing for audits. In addition to that, many organizations have begun the process of implementing plans for IT transformation initiatives, including virtualization and cloud computing. Even for well-trained and seasoned security teams, adding these processes – in addition to the already time consuming efforts of network monitoring and information security – can become a daunting task. Join our conversation to learn how to modernize your enterprise through tight security posture, rapid service delivery and regulatory compliance across all platforms.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 29, 2015
5:30pm - 8:30pm
Morton’s The Steakhouse
1511 6th Ave
Seattle, WA 98101
Registration
Bill Boni

Bill Boni
Vice President and Corporate Information Security Officer
T-Mobile USA
ISE® North America Commercial Executive Award Finalist 2007
ISE® Central Executive Award Winner 2007

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 30, 2015
5:30pm - 8:30pm
The Capital Grille
301 5th Avenue
Pittsburgh, PA 15222
Registration
Frank Donahoe

Franklin Donahoe
Chief Information Security Officer
Mylan
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Agile Security: Building A Faster, Stronger, More Responsive Model

August 4, 2015
5:30pm - 8:30pm
Bouchon Bistro at The Venetian Resort & Casino
3355 Las Vegas Boulevard South
Venezia Tower, 10th Floor
Las Vegas, NV 89109
Registration
David Cass

David Cass
SVP & Chief Information Security Officer
Elsevier
ISE® Northeast People's Choice Award Winner 2013
Biography

Enterprises continue to invest heavily in virtual and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of cloud benefits, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to develop a more agile, efficient and effective security infrastructure to enable your enterprise to fully capitalize on the many benefits of Infrastructure-as-a-Service (IaaS).

The ISE® Lions' Den and Jungle Lounge

August 5, 2015
3:00 pm - 6:30 pm
Vdara Hotel & Spa at Aria Las Vegas
Details

This summer TEN of security’s hottest emerging security companies have the courage to enter… The ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. Inside the den, each Gazelle will deliver their best pitch for the chance to earn the top award of more than $30,000 in prizes. Running concurrently, the Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with a diverse group of security executives, investors and other key members of the information security community.

ISE® VIP RECEPTION
Cyber Defense Knowledge Exchange: Adopting an Adversarial Mindset

August 6, 2015
7:00pm - 10:00pm
The Cosmopolitan of Las Vegas
Chandelier Room
3708 Las Vegas Boulevard South
Las Vegas, NV 89109
Details
Registration
 

As security professionals, you don’t just collect intelligence—you analyze it, understand it, share it, and generate more. You use this intelligence to stay ahead in a rapidly changing cyberthreat landscape where you face persistent, unrelenting adversaries—both inside and outside your organizations. Intelligence drives your defense strategy and empowers your team to adopt an adversarial mindset to hunt down and eliminate cyber-attacks in real-time. Join our ISE® Alumni Hosts and program sponsors Cybereason and Lockheed Martin for an engaging reception and the opportunity to share your experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 11, 2015
5:30pm - 8:30pm
Donovan’s Steak and Chop House
3101 East Camelback Road
Phoenix, Arizona 85016
Registration
Sean Azhadi

Sean Azhadi
Vice President & Chief Technology Officer
Arizona State Savings & Credit Union
Biography

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 12, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Registration
Christopher Hudel

Christopher Hudel
CISO
SPX Corporation
Biography

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

August 13, 2015
5:30pm - 8:30pm
The Palm Restaurant
1750 Tyson's Boulevard
McLean, VA 22102
Registration
Joseph Lee

Joseph Lee
Chief Information Security Officer
Georgetown University

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security

August 18, 2015
5:30pm - 8:30pm
The Capital Grille
4740 Jefferson St.
Kansas City, MO 64112
Registration

Don Ainslie
Vice President, Security, Privacy and Risk
DST Systems

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® WEST PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

August 19, 2015
5:30pm - 8:30pm
Morton's Steakhouse
400 Post Street
San Francisco, CA 94102
Registration

Jeff Trudeau
Information Security Officer
Sutter Health
ISE® West Project Award Winner 2013
ISE® North America Health Care Executive Award Winner 2013
ISE® Success Story

Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® West Executive Forum and Awards 2015

The ISE® West Executive Forum and Awards 2015 will be held on August 20, 2015 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 25, 2015
5:30pm - 8:30pm
Elway’s Downtown
1881 Curtis Street
Denver, CO 80202
Registration
General

Matt Shufeldt
VP & CISO
Sports Authority

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
Untangling the Enterprise: Using Information Protection Solutions to Improve Security Efficiency

August 26, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
3400 W Olive Ave.
Burbank, CA 91505
Registration

Data is everywhere—in the cloud, on the network, and in transit—and always within reach of users. Employees use a multitude of different devices and programs to do their jobs, some of which the company may or may not own, and the disparate collection of operating systems, platforms, and apps have shattered the traditional boundaries that IT relied on to safeguard information. With so many variables in play, maintaining operational efficiency and security simultaneously becomes a daunting task for even the most seasoned security professionals. However, by adopting best practices and technology that enable your team to locate, monitor, and eliminate threats faster, you can improve your operational and security efficiency. Join our conversation to learn how your organization can employ information protection solutions to discover threats faster, monitor data more efficiently, and protect that data no matter where it may reside.

ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Data on and off the Network

August 27, 2015
5:30pm - 8:30pm
Fleming's Prime Steakhouse
25 East Ohio Street
Chicago, IL 60611
Registration

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.

ISE® PRIVATE DINNER
Applying Threat Intelligence to Enhance Cyber Security

September 1, 2015
5:30pm - 8:30pm
The Palm
One International Place
Boston, MA 02110
Registration
David Billeter

David Billeter
Vice President, Global Security, Privacy and Regulatory Compliance
Staples
Biography

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® PRIVATE DINNER
Scaling Security Across the Enterprise

September 2, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Registration

Application security threats continue to evolve at a rapid pace. At the same time, the size of the standard enterprise has also grown, extending beyond traditional borders and storage methods, leveraging different frameworks such as cloud, mobile, web and embedded devices. While this expansion allows for greater connectivity and the potential for further growth, it also opens up new avenues of attack. As the size and scope of the applications expand, your security application model and protocols must be scaled to ensure applications remain secure and protected against potential threats. Join our conversation to learn how you can proactively build security into the earliest stages of your software development lifecycle, enhance your application security program and scale security across your organization and to third party companies.

ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

September 10, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
788 W. Sam Houston Parkway North
Houston, TX 77024
Registration

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 10, 2015
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Registration

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® Northeast Executive Forum and Awards 2015

The ISE® Northeast Executive Forum and Awards 2015 will be held on October 8, 2015 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

November 5, 2015
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
250 Northern Ave
Boston, MA 02210
Registration
Larry Wilson

Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 -
Academic/Public Sector Category

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® North America Leadership Summit and Awards 2015

The ISE® North America Leadership Summit and Awards will be held November 10-11, 2015 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details