Upcoming Events

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

February 11, 2016
5:30pm - 8:30pm
Max Downtown
185 Asylum Street
Hartford, CT 06103

Sameer Sait

Sameer Sait
Vice President & Chief Information Security Officer
Arrow Electronics
Biography

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

February 18, 2016
5:30pm - 8:30pm
The Capital Grille
444 Brickell Ave
Miami, FL 33131
Registration
Athanasiou Ken

John Christly
Chief Information Security Officer and HIPAA Security Officer
Nova Southeastern University
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence

February 23, 2016
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219
Registration
Haddon Bennett

Haddon Bennett
Chief Information Security Officer
Change Healthcare
Biography

Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.

ISE® VIP Programs at RSA 2016

Once again, T.E.N. via the ISE® VIP Programs will proudly be at the RSA® Conference 2016 with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference 2016.

ISE® VIP Programs include a special breakfast, luminary luncheons, and exclusive VIP receptions in evenings. As our ISE® VIP Programs have been oversubscribed in previous years due to limited availability, we recommend that you register for these programs early. Details

ISE® VIP Welcome Reception
The Tastes of San Francisco Tour hosted by Bromium: Experience The City’s Diverse Cuisine

February 28, 2016

5:30 pm – 7:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Work Room 2-3
Register now!
More Information

Fresh seafood, North Beach Italian, Asian Fusion, crepes and coffee… San Francisco is celebrated for its diverse cuisine, savory entrées and decadent desserts. Experience the many delectable dishes of the Bay Area without leaving the welcoming ambiance of the W Hotel. Take a culinary tour with program sponsor Bromium, ISE® Alumni Hosts and your peers in information security as you indulge in the many mouthwatering flavors of San Francisco.

ISE® VIP Reception
Cyber Defense Knowledge Exchange: Adopting an Adversarial Mindset

February 29, 2016

7:00 pm – 10:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Upstairs Bar/Mixx
More Information

Hosted by our ISE® Alumni VIP Hosts please come and enjoy the killer views of San Francisco from the rooftop terrace at the St. Regis – drink, eat and enjoy mixing and mingling with your peers while discussing some of the industry's hottest topics!

Symantec/ISE® VIP Signature Luncheon

March 1, 2016


12:00 pm – 2:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information

Join our distinguished ISE® Alumni Hosts and program sponsor Symantec for an engaging luncheon and conversation, and discover the many exciting changes that lie on the horizon as the company continues to evolve as a global leader in security solutions. This is an excellent opportunity to hear directly from Symantec’s President & CEO, Mike Brown, on the Security Operations of 2020. Join us to hear how Symantec will:
- Protect against tomorrow’s threats
- Keep your data safe as you move into the Cloud
- Lean on the world’s best experts
- Reduce your security risk

ISE® VIP Reception

Sponsored by:
Six of the Industry’s Hottest Security Companies!

March 1, 2016

7:00 pm - 10:00 pm
St Regis Hotel
125 Third St.
San Francisco, CA 94103
Terrace
Register now!
More Information

Hosted by our ISE® Alumni VIP Hosts please come and enjoy the killer views of San Francisco from the rooftop terrace at the St. Regis – drink, eat and enjoy mixing and mingling with your peers while discussing some of the industry's hottest topics!

T.E.N. & ISE® Sales and Marketing Breakfast

Sponsored by:

March 2, 2016

7:45 am - 10:00 am
The W Hotel
181 Third Street
San Francisco, CA 94103
Social Terrace
Register now!
More Information

Learn From the Top CISO’s on What Influences Them to Respond To You
Your next customer doesn’t want to hear from you via an impersonal cold call, through a flashy email or unsolicited meeting notice. So how do you get your foot in the door for a meeting? What are the best strategies and secrets for ensuring you connect with the right people at the right times and in an ethical and timely manner? Find the answers by asking a CISO yourself at the T.E.N.’s ISE® Sales and Marketing Breakfast during the 2016 RSA® Conference. Our panel of executive thought leaders will share their real world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give an inside track to effectively marketing and selling solutions to the nation’s top IT and security executives.

ISE® VIP Signature Luncheon with Bay Dynamics
Bridging the Communication Gap: Best Practices for Reporting to Your Board

March 2, 2016

11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
Register now!
More Information

Security executives are increasingly required to report to CEOs and the board of directors about cybersecurity risk in the enterprise. It’s a golden opportunity for CISOs and CIROs to make security champions out of the most influential leaders in the organization. Unfortunately, it’s also an opportunity often missed by IT and security teams. Only 25 percent of board audit committees in the United States say the quality of cybersecurity information they receive is good. With most security reporting metrics being useless to their board, CISOs and CIROs need to prepare their reporting with the rigor of a CFO. If you feel like you're having a hard time getting through to your CEO and board of directors, it might be time to rethink your approach. We will discuss the metrics that the board wants, what information CISOs and CIROs often don’t have, and the critical ways you can improve how you communicate risk up the management chain. Hosted by our ISE® Alumni VIP Hosts please come and enjoy a stimulating lunch conversation!

ISE® VIP Reception
Guarding the Heart of the Enterprise through Strategic Data Protection

March 2, 2016

6:00 pm - 8:00 pm
St Regis Hotel
125 Third St.
San Francisco, CA 94103
Conservatory
Register now!
More Information

The top advanced threat solution providers acknowledge they cannot prevent or detect every attack. Whether you have a next generation firewall on the network or a new EDR product at the endpoint, the bad guys are still getting in. So what are you supposed to do to ensure you don’t suffer a devastating breach? Investing in a well formed, holistic data protection program is a proven approach that stops the theft of sensitive data. Join us for this engaging reception during RSA® Conference 2016 to learn how you can improve your security posture through broader visibility and granular controls to ensure your enterprise’s most valuable asset – the data - is secure.

ISE® VIP Signature Luncheon
Breach Anywhere is Breach Everywhere

March 3, 2016

11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Great Room
Register now!
More Information

The top advanced threat solution providers acknowledge they cannot prevent or detect every attack. Use of stolen credentials is the #1 threat to web application security according to 2015 Verizon Data Breach report. Spilled credentials have fueled major website attacks against Uber, Fitbit, JPMC, and Toys”R”Us in 2015 alone. Targeted organizations can lose control of thousands of customer accounts and experience tens of millions of dollars in fraud losses. Over lunch, we’ll discuss the automation used by attackers to bypass web application firewalls and fraud control, and we’ll examine our options for securing online applications. Join us and we’ll decide for ourselves if the situation is truly hopeless.

ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence

March 10, 2016
5:30pm - 8:30pm
Capital Grille- Tyson’s Corner
1861 International Dr
McLean, VA 22102
Registration
Amanda Cody

Amanda Cody
VP of Information Security
National Geographic Partners
Biography

Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.

ISE® SOUTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

March 14, 2016
5:30pm - 8:30pm
Ruth’s Chris Steakhouse(Centennial Olympic Park)
267 Marietta St
Atlanta, GA 30313
Registration

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® Southeast Executive Forum and Awards 2016

The ISE® Southeast Executive Forum and Awards 2016 will be held on March 15, 2016 at the Westin Buckhead Hotel in Atlanta, GA. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From Breach

March 22, 2016
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, OH 43215
Registration

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® PRIVATE DINNER
The Secure Data Exchange Solution

March 22, 2016
5:30pm - 8:30pm
Del Frisco’s Steakhouse
5251 Spring Valley Road
Dallas, TX 75254
Registration

As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.

ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Governance and Security Management

March 23, 2016
5:30pm - 8:30pm
Palm Restaurant
140 5th Avenue South
Nashville, TN 37203
Registration

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s attackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of users, especially those with elevated access rights. Access governance has tried to reduce the access footprint, but has largely become a compliance rubber-stamping exercise. Closing the gap requires a new approach. Applying security context and user access behavior into your identity and access governance efforts are imperative to reducing the vulnerability presented by our weakest link - users. Join our conversation for a deep dive into identity, access governance and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Governance and Security Management

March 24, 2016
5:30pm - 8:30pm
The Capital Grille (at The Galleria)
5365 Westheimer Rd
Houston, TX 77056
Registration

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s attackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of users, especially those with elevated access rights. Access governance has tried to reduce the access footprint, but has largely become a compliance rubber-stamping exercise. Closing the gap requires a new approach. Applying security context and user access behavior into your identity and access governance efforts are imperative to reducing the vulnerability presented by our weakest link - users. Join our conversation for a deep dive into identity, access governance and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From Breach

March 30, 2016
5:30pm - 8:30pm
Max Downtown
185 Asylum Street
Hartford, CT 06103
Registration

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® Central Executive Forum and Awards 2016

The ISE® Central Executive Forum and Awards 2016 will be held on May 3, 2016 in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® West Executive Forum and Awards 2016

The ISE® West Executive Forum and Awards 2016 will be held on July 21, 2016 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2016

The ISE® Northeast Executive Forum and Awards 2016 will be held on October 4, 2016 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2016

The ISE® North America Leadership Summit and Awards will be held November 9-10, 2016 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details