Upcoming Events

ISE® PRIVATE DINNER
The Secure Data Solution

June 29, 2016
5:30pm - 8:30pm
Fleming’s Steakhouse
210 E Trade St
Charlotte, NC 28202
Registration
Clarke Rodgers

Clarke Rodgers
Chief Information Security Officer
Velogica - SCOR Global Life Americas
Biography

As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.

ISE® PRIVATE DINNER
The Secure Data Solution

June 29, 2016
5:30pm - 8:30pm
Metropolitan Grill
820 2nd Ave
Seattle, WA 98104
Registration
Bill Boni

Bill Boni
Vice President, Information Security
T-Mobile USA
Biography

As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.

ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Governance and Security Management

July 12, 2016
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
1855 S Lindbergh Blvd.
St. Louis, MO 63131
Registration
Steven Jensen

Steven Jensen
Executive VP and Chief Information Security Officer
Scottrade
ISE® North America Commercial Executive Award Finalist 2013
Biography

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s attackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of users, especially those with elevated access rights. Access governance has tried to reduce the access footprint, but has largely become a compliance rubber-stamping exercise. Closing the gap requires a new approach. Applying security context and user access behavior into your identity and access governance efforts are imperative to reducing the vulnerability presented by our weakest link - users. Join our conversation for a deep dive into identity, access governance and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Information in Motion

July 14, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration
James Morris

James Morris
Global Information Security Officer Global Functions
Citigroup Inc.

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.

ISE® WEST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

July 20, 2016
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St
San Francisco, CA 94102
Registration

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® West Executive Forum and Awards 2016

The ISE® West Executive Forum and Awards 2016 will be held on July 21, 2016 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration

July 26, 2016
5:30pm - 8:30pm
David Burke’s Primehouse
616 N Rush St
Chicago, IL 60611
Registration

Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

July 27, 2016
5:30pm - 8:30pm
The Palm - Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Registration

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration

July 28, 2016
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Registration

Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.

ISE® PRIVATE DINNER
Future Is Agile: Securing Servers In Modern Datacenter, Private Cloud And Public Cloud

August 2, 2016
5:30pm - 8:30pm
Bouchon- The Venetian
3355 S Las Vegas Blvd
Las Vegas, NV 89109
Registration

This ISE® Private Dinner is the evening before the ISE® Lions’ Den and Jungle Lounge as well as coincides with the security conferences that are taking place throughout the week in Las Vegas

The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This change has been challenging as many traditional security approaches don’t translate well into cloud computing models. Security and compliance teams are learning that force fitting old tools can result in gaps in coverage, repeated manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of a dynamic infrastructure.

The ISE® Lions' Den & Jungle Lounge



August 3, 2016
Vdara Hotel & Spa at Aria Las Vegas
Details

This summer TEN of security’s hottest emerging security companies have the courage to enter… The ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. Inside the den, each Gazelle will deliver their best pitch for the chance to earn the top award of more than $25,000 in prizes. Running concurrently, the Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with a diverse group of security executives, investors and other key members of the information security community.

ISE® VIP RECEPTION
Returning Power to the Defender