Upcoming Events

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

April 22, 2014
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center West
Dunwoody, GA 30346
Registration
Joe Bennett

Joe Bennett
Chief Information Security Officer
YP
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER
The Information Security Iceberg: Demonstrating the True Value of Data Privacy and Security

April 29, 2014
5:30pm - 8:30pm
Absinthe Brasserie & Bar
398 Hayes St at Gough
San Francisco, CA 94102
Registration

Jonathan Rosenoer
Senior Vice President, Head of Operational Risk
Bank of the West

Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders, but have we fully uncovered the true value of data privacy and security — or is this the tip of the iceberg? Join us for a candid discussion with your peers as we analyze the legal ramifications and punitive damages of data and security breaches, calculate the impact of cyber risk from a liability and cost perspective and explore real-world challenges in protecting information.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 1, 2014
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
210 E. Trade St.
Charlotte, NC 28202
Registration

Prentis Brooks
Director, Information Security
Time Warner Cable
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 13, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
1710 Wynkoop St.
Denver, CO 80202
Registration
 

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Risky Business – Why DLP Should be Fundamental to Your Security Strategy

May 13, 2014
5:30pm - 8:30pm
The Chicago Chop House
60 W. Ontario St.
Chicago, IL 60654
Registration

David Gochenaur
Director of Global Information Security
AON

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER: Securing the Supply Chain
Challenges and Best Practices for Mitigating Third-Party Risk

May 15, 2014
5:30pm - 8:30pm
Hy’s Steakhouse
120 Adelaide St. W
Toronto, ON M5H 1T1
Registration
Chris Wysopal

Chris Wysopal
Co-Founder and Chief Technology Officer
Veracode
Biography

When sources revealed that the infamous Target breach was a result of supply chain vulnerabilities, the impact was felt industry wide, leaving many asking an important question — who takes responsibility for the security of third-party vendors? New PCI Data Security Standards hold businesses and organizations accountable, but vast and rapidly expanding web perimeters create immense challenges for a CISO, who must manage the maze of web assets and third-party solutions with fixed resources and funding. Join our conversation to discuss the biggest challenges and best practices for mitigating third-party risk and learn how to build an effective program to secure your entire application infrastructure.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 20, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
1426-28 Chestnut Street
Philadelphia, PA 19102
Registration
Todd Bearman

Todd Bearman
Chief Information Security Officer
Tower Watson
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

May 21, 2014
5:30pm - 8:30pm
Seven Steakhouse
700 Hennepin Avenue
Minneapolis, MN 55403
Registration
 

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

VIRTUAL TRAINING: Your Guide Through the SWAMP: Avoiding Predators in a Murky World

May 22, 2014
2-3 p.m. EST
Registration

Software has become an essential component of our nation’s critical infrastructure, growing in size, capability and complexity at a rate that exceeds our ability to keep pace with assuring its quality. As development teams quickly generate new code to meet their organization’s demands, individuals and groups with malicious intent lurk, waiting for the opportunity to exploit software vulnerabilities, which disrupt business continuity, compromise assets and create significant financial burdens. The Software Assurance Marketplace enables developers to build in solid assurance and security practices early and throughout the SDLC, dramatically reducing vulnerabilities and risk. Join us to tour the SWAMP and learn how to gain free and unfettered access to the capabilities necessary to effectively identify and resolve software defects and ultimately build a stronger software assurance program.

ISE® PRIVATE DINNER: The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

May 28, 2014
5:30pm - 8:30pm
Del Frisco’s Grille
3376 Peachtree Rd
Atlanta, GA 30326
Registration
 

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® Central Private Welcome Dinner:
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

June 10, 2014
5:30pm - 8:30pm
Dallas Chop House
1717 Main Street
Dallas, TX 75201
Registration
 

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® Central Executive Forum and Awards 2014

The ISE® Central Executive Forum and Awards 2014 will be held on June 11, 2014 at the Sheraton Hotel in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

June 17, 2014
5:30pm - 8:30pm
The Capital Grille
444 Brickell Ave
Miami, FL 33131
Registration
 

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Virtualization and the Cloud - Security as an Enabler

June 17, 2014
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Registration
 

Interest in private and hybrid cloud adoption is surging because clouds offer large operational and financial benefits. By sharing application, computer, and network resources in a virtualized environment, business units and cloud service providers can boost IT speed and efficiency, business agility, resource utilization, and profitability. Although there are no questions about the benefits, there is significant debate about the potential risk regarding protection of key assets and data, admin access, multitenancy risk, visibility loss, and compliance. Join our conversation to discuss the role of security as enabler in both public and private cloud adoption, and learn best practices for mitigating risk and effectively addressing the new security challenges created by virtualized environments.

ISE® PRIVATE DINNER
The Missing Link: Integrating Defenses for Web, Email and Data Loss Prevention (DLP)

June 18, 2014
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
4725 Piedmont Row Dr. #170
Charlotte, NC 28210
Registration
 

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, organizations need to have a dynamic approach to security. Successful security teams realize they need real-time, unified, contextual defenses in order to protect against emerging threats and remain effective in data loss prevention efforts. Join our conversation to examine the link between web security, email security and DLP and discuss why advanced, comprehensive, integrated and real-time security solutions and technologies have become necessary to protecting your organization from cybercriminal activity.

ISE® PRIVATE DINNER: Aligning Vulnerability and Privilege Management in the Context of Business Risk

June 25, 2014
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Registration
 

Despite gigantic investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts of data. CISOs need new strategies for assessing, prioritizing and addressing both internal and external risks in business context. Join our conversation to discuss how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

ISE® West Private Welcome Dinner:
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently

July 29, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St
San Francisco, CA 94102
Registration
 

The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® West Executive Forum and Awards 2014

The ISE® West Executive Forum and Awards 2014 will be held on July 30, 2014 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Canada Executive Forum and Awards 2014

The ISE® Canada Executive Forum and Awards 2014 will be held on September 10, 2014 at the Trump International Hotel & Tower in Toronto, ON. The ISE® Canada Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2014

ISE Awards

The ISE® Northeast Executive Forum and Awards 2013 will be held on October 9, 2014 at the Westin Times Square in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2014

ISE Awards

The ISE® North America Leadership Summit and Awards will be held on November 5-6, 2014 at the Westin Alexandria, VA. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details