Upcoming Events

ISE® PRIVATE DINNER
Risky Business – Why DLP Should be Fundamental to Your Security Strategy

October 1, 2014
5:30pm - 8:30pm
The Palm Restaurant
Westin Buckhead Hotel
3391 Peachtree Rd NE
Atlanta, GA 30326
Registration
Tim Callahan

Tim Callahan
Chief Information Security Officer
Aflac Incorporated
ISE® Northeast People's Choice Award Winner 2009
ISE® North America Executive Award Finalist 2009
ISE® Northeast Executive Award Finalist 2009
ISE® Northeast Executive Award Finalist 2007
ISE® Southeast People's Choice Award Winner 2006
ISE® Southeast Executive Award Finalist 2006

Biography
T.E.N. Success Story

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER
The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

October 2, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
103 Summit Blvd
Birmingham, AL 35243
Registration

Dave Summitt
Chief Information Security Officer
UAB Health System
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® NORTHEAST PRIVATE WELCOME DINNER
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

October 8, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Wait List Request
Joe Bernik

Joe Bernik
SVP Risk
HSBC
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® Northeast Executive Forum and Awards 2014

ISE Awards

The ISE® Northeast Executive Forum and Awards 2014 will be held on October 9, 2014 at the Westin Times Square in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Real Life War Games: Avoiding the High-profile Mega Breach

October 13, 2014
5:30pm - 8:30pm
Ruth's Chris Steak House
Embassy Suites Buckhead
3285 Peachtree Road NE
Atlanta, GA 30305
Registration
Kathy Lamb

Kathy Lamb
IT Business Partner
Honeywell
Biography

In 1983, the idea of hacking into a computer system was science fiction, but today it is a terrifying – almost daily – reality. Almost 500 security breaches have been reported during 2014 alone, several of which have been high-profile, significant incidents compromising the private data of millions of people, costing millions of dollars, consuming excessive amounts of time to remediate and in some cases destroying careers. From malware to Heartbleed to outdated security practices, malicious hackers wait to exploit your smallest vulnerability – who will be next? Join our conversation to dive deep into the mega breach, discuss what it could mean for your company and learn how making security a priority at every level can protect you from becoming the next victim.

ISE® PRIVATE DINNER
The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

October 15, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
4322 W Boy Scout Blvd
Tampa, FL 33607
Registration
Bobby Dominguez

Bobby Dominguez
Chief Information Risk Officer, SVP
PNC Bank
Biography

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

October 16, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
25 East Ohio St.
Chicago, IL 60611
Registration
 

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

October 29, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
2222 McKinney Ave
Dallas, TX 75201
Registration
Scott Howitt

Scott Howitt
VP, CISO
J.C. Penney
ISE® Central Executive Award Winner 2012
Biography
T.E.N. Success Story

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® NORTH AMERICA PRIVATE WELCOME DINNER
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

November 4, 2014
5:30pm - 8:30pm
The Grille at Morrison House
116 South Alfred Street
Alexandria, VA 22314
Registration
Chris Tignor

Chris Tignor
VP, Information Security & Risk Management
Capital One
ISE® North America Commercial Executive Award Finalist 2008
Biography

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® North America Leadership Summit and Awards 2014

ISE Awards

The ISE® North America Leadership Summit and Awards will be held on November 5-6, 2014 at the Westin Alexandria, VA. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

November 12, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Registration
Roland Cloutier

Roland Cloutier
Vice President, Chief Security Officer
ADP
ISE® Northeast Executive Award Winner 2012
ISE® Northeast People's Choice Award Winner 2012
ISE® North America Commercial Executive Award Winner 2012

Biography
T.E.N. Success Story

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® PRIVATE DINNER
Objective Security Ratings for Vendor Risk Management and Performance Benchmarking

November 13, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 W Olive Ave
Burbank, CA 91505
Registration
Geoffrey Aranoff

Geoffrey Aranoff
Chief Information Security Officer
Broadcom Corporation
ISE® West Executive Award Finalist 2008
Biography

According to Enterprise Strategy Group research, only 13% of enterprise organizations claim that they have a complete IT risk profile, which means many are “flying blind” when addressing current escalating threats and vulnerabilities, particularly when confronted with the risk posed by vendors in their supply chain. CISOs need increased visibility about their partners’ security performance as well as the ability to benchmark themselves against their peers. Join our conversation to discover how objective Security Ratings can provide the necessary visibility to better manage vendor risk and learn how CISOs can implement appropriate security benchmarking strategies to support business goals.

ISE® PRIVATE DINNER
Real-time Answers; Real-time Action: Your Solution to Better Incident Response

December 4, 2014
5:30pm - 8:30pm
Trump International Hotel
The Exchange Floor - Wall Street
325 Bay Street
Toronto, ON M5H 4G3
Registration
 

Modern malware and advanced persistent threats are capable of exfiltrating massive amounts of data in minutes and moving silently throughout an enterprise environment. Attacks will compromise sensitive information, cause business critical system outages and cost organizations a substantial amount of time and money if incident response teams cannot take corrective action swiftly. The challenge is most organizations lack a true “real-time” view of the enterprise with visibility into unmanaged assets as well corporate as devices that are both on and off your network. Additionally, relying on information that is days or even weeks old makes it impossible to find the answers you need to take immediate action. Join our conversation to discuss how instant access to complete, real-time data can transform your incident response strategy by enabling your team to ask questions, get immediate, current and real-time answers and take instant action to remediate while the incident is still occurring.