Upcoming Events

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

April 28, 2016
5:30pm - 8:30pm
The Palm - Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Registration
Brad Sanford

Brad Sanford
Chief Information Security Officer
Emory University
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® CENTRAL PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

May 2, 2016
5:30pm - 8:30pm
The Capital Grille
500 Crescent Ct.
Dallas, TX 75201
Registration
Betty Elliot

Betty Elliot
VP, CISO
Moneygram
Biography

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® Central Executive Forum and Awards 2016

The ISE® Central Executive Forum and Awards 2016 will be held on May 3, 2016 in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
The Secure Data Solution

May 11, 2016
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 W Olive Ave
Burbank, CA 91505
Registration
MAx Solonski

Max Solonski
Chief Security Officer
Blackline
Biography

As organizations grow in size, the need to share information in a fast, reliable and safe way has also grown. Your employees’ ability to securely share and access key business data—from anywhere and at any time—is paramount to the success and longevity of your business. While secure file sharing technologies can make a huge difference to your business, much more is involved in securing your data. One of the biggest challenges organizations must proactively address is managing data security, while maintaining industry and government compliance regulations. A report by Globalscape revealed that “45% of employees use consumer file sharing sites to move corporate data – not traceable, not secure, not compliant.” Join our conversation to learn how your security team can employ on-premises, cloud-based and/or hybrid managed file transfer solutions to improve compliance, and increase efficiency and visibility of your data via a scalable and flexible solution.

ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence

May 12, 2016
5:30pm - 8:30pm
Mitchell’s
45 North Third Street
Columbus, OH 43215
Registration

Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

May 17, 2016
5:30pm - 8:30pm
The Metropolitan Grill
820 2nd Ave
Seattle, WA 98104
Registration
Darren Challey

Darren Challey
VP Enterprise Information Security
Expedia, Inc.
Biography

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

May 18, 2016
5:30pm - 8:30pm
McCormick & Schmick's
800 Nicollet Mall
Minneapolis, MN 55402
Registration

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

May 19, 2016
5:30pm - 8:30pm
David Burke's Primehouse
616 North Rush Street
Chicago, IL 60611
Registration
Yasir Pervaiz

Yasir Pervaiz
Sr. Manager of Application Security
U.S. Bank

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

May 24, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Fighting Cybersecurity Adversaries despite the Global Staffing Shortage: Exploring the Role of Automation in Detection and Response

May 25, 2016
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center
Dunwoody, GA 30346
Registration
Steve Adegbite

Steve Adegbite
Chief Information Security Officer
eTrade
Biography

While some claim that the state of cyber security has reached full-blown systemic failure, the growing realization that we live in a post-breach world is driving new approaches that promise a brighter future in the fight against cyber-security adversaries. Join the discussion to learn about finding the right mix of human talent and innovative technologies to overcome the security talent shortage and defeat advanced threats that may already be inside your organization.

ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Data on and off the Network

May 26, 2016
5:30pm - 8:30pm
Hy’s Steakhouse Toronto
101-120 Adelaide Street West
Toronto, ON M5H 1T1
Registration

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

June 2, 2016
5:30pm - 8:30pm
Jeff Ruby's Precinct
311 Delta Avenue
Cincinnati, OH 45226
Registration

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

June 7, 2016
5:30pm - 8:30pm
Pappas Bros.
10477 Lombardy Ln
Dallas, TX 75220
Registration

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Keeping the Keys to the Kingdom out of the Hands of the Enemy

June 8, 2016
5:30pm - 8:30pm
Morton’s
618 Church St.
Nashville, TN 37219
Registration

New threats target the trust provided by keys and certificates, and allow bad guys to look legitimate so they can surveil networks, stay undetected, steal data, and bypass other security systems. For example, attacks using SSL/TLS to circumvent critical controls are steadily increasing. Gartner expects that by 2017, more than 50% of network attacks will use encrypted SSL/TLS. The ability to quickly decrypt and inspect SSL traffic in real time and detect threats is, therefore, imperative. Join our conversation to learn how your organization can better prepare and mitigate potential damage from SSL/TLS abuse through improved visibility and tighter control of key and certificate inventories at an enterprise-wide level.

ISE® PRIVATE DINNER
Have Your Cake and Eat It Too: Boost Agility and Security with Network Security Policy Orchestration

June 9, 2016
5:30pm - 8:30pm
Max Downtown
185 Asylum St
Hartford, CT 06103
Registration

Between the shortage of skillful IT security professionals and the rise of the digital age, it is increasingly difficult for organizations to balance agility and security. Network operations and security teams are tasked with ensuring connectivity and supporting business initiatives in a timely manner. In addition, they are expected to protect the network from cyber threats and comply with internal policies and industry regulations. As applications span across physical networks, private cloud and public cloud platforms, security policies and connectivity can no longer be managed in silos and communication gaps between operations and security teams must be bridged. There is a growing need for visibility and control across physical networks and hybrid cloud platforms in order to model and manage application connectivity that is infrastructure agnostic. Join our conversation to learn how to use network security policy orchestration to implement security changes in minutes instead of days with baked-in security & compliance.

ISE® PRIVATE DINNER
Have Your Cake and Eat It Too: Boost Agility and Security with Network Security Policy Orchestration

June 15, 2016
5:30pm - 8:30pm
Mitchell’s
45 N 3rd St
Columbus, OH 43215
Registration

Between the shortage of skillful IT security professionals and the rise of the digital age, it is increasingly difficult for organizations to balance agility and security. Network operations and security teams are tasked with ensuring connectivity and supporting business initiatives in a timely manner. In addition, they are expected to protect the network from cyber threats and comply with internal policies and industry regulations. As applications span across physical networks, private cloud and public cloud platforms, security policies and connectivity can no longer be managed in silos and communication gaps between operations and security teams must be bridged. There is a growing need for visibility and control across physical networks and hybrid cloud platforms in order to model and manage application connectivity that is infrastructure agnostic. Join our conversation to learn how to use network security policy orchestration to implement security changes in minutes instead of days with baked-in security & compliance.

ISE® PRIVATE DINNER
Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information

June 16, 2016
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Registration

In today’s threat landscape, the high frequency of unauthorized intrusions drive an ever-increasing need to maintain security, access and control of mission-critical information. From simple sharing of proprietary documents to surveillance and monitoring, corporations struggle to maintain efficiency without creating unnecessary risk. The need to collaborate securely across international boundaries creates additional challenges for your business. Join us for a conversation with your peers to address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment.

ISE® West Executive Forum and Awards 2016

The ISE® West Executive Forum and Awards 2016 will be held on July 21, 2016 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2016

The ISE® Northeast Executive Forum and Awards 2016 will be held on October 4, 2016 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2016

The ISE® North America Leadership Summit and Awards will be held November 9-10, 2016 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details