Upcoming Events

ISE® PRIVATE DINNER
IT Hygiene– What’s Your Source of Truth? And How Much Do You Trust It?

September 8, 2016
5:30pm - 8:30pm
Truluck’s
777 Brickell Ave
Miami, FL 33131
Registration
Ken Athanasiou

Ken Athanasiou
VP, Chief Information Security Officer
AutoNation
Biography

Good IT hygiene is essential for good security in every organization but is being consistently overlooked by Enterprises. What’s the point of worrying about Zero-Days and APTs if you can't answer with confidence what systems are on your network, what's running in your environment or whether your systems are patched? It's time to do the basics, better.

Join our conversation to discuss how security hygiene and having shared visibility by both IT Operations and Security can more effectively allow an organization to detect, investigate, remediate and build good security hygiene into ongoing IT operations processes. We’ll discuss how innovative technologies can improve cyber resilience and enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

September 13, 2016
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Registration
Douglas Crawford

Douglas Crawford
Vice President Network Services
Warner Bros. Entertainment Inc.
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® PRIVATE DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

September 14, 2016
5:30pm - 8:30pm
The Palm
1750 Tyson's Boulevard
McLean, VA 22102
Registration
Deborah Wheeler

Deborah Wheeler
Chief Information Security Officer
Freddie Mac
Biography

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

September 14, 2016
5:30pm - 8:30pm
El Gaucho
2505 1st Ave.
Seattle, WA 98121
Registration
Sean Murphy

Sean Murphy
VP, CISO
Premera Blue Cross
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® PRIVATE DINNER
Improving Security through Network Control and Intelligence

September 15, 2016
5:30pm - 8:30pm
Mitchell’s
45 North Third Street
Columbus, OH 43215
Registration
Larry Wilson

Helen Patton
Chief Information Security Officer
The Ohio State University
Biography

Today’s targeted attacks are more sophisticated than ever and target both infrastructure and data in an enterprise. Security professionals are inundated with siloed technologies that help with one aspect of security detection or response – but these solutions don’t work well together or use intelligence from network sources to improve efficacy. Ensuring safety of critical assets like sensitive data and critical network infrastructure, and accelerating security response by using real time network data is key to staying ahead of threats and vulnerabilities. Join our conversation to learn how your team can use DNS, DHCP and IP Address data to protect your sensitive information, disrupt malware/APT communications, defend against DNS DDoS and share threat information with leading security solutions, SIEM and threat intelligence platforms using standard threat sharing protocols.

ISE® PRIVATE DINNER
Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information

September 15, 2016
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Registration
Nicholas Shevelyov

Nicholas Shevelyov
Chief Security & Privacy Officer
Silicon Valley Bank
Biography

In today’s threat landscape, the high frequency of unauthorized intrusions drive an ever-increasing need to maintain security, access and control of mission-critical information. From simple sharing of proprietary documents to surveillance and monitoring, corporations struggle to maintain efficiency without creating unnecessary risk. The need to collaborate securely across international boundaries creates additional challenges for your business. Join us for a conversation with your peers to address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment.

ISE® PRIVATE DINNER
Bringing the Threat to Zero: Improving Defenses Against Malware and Ransomware

September 19, 2016
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219
Registration
Michael Mangold

Michael Mangold
Vice President, IT Security & BCP/DR
Tractor Supply Company
Biography

While many dubbed 2013 as the “Year of Breaches,” they weren’t the only threat to grow at an exponential rate. According to a January 2015 report from AV-Test2, malware incidents increased 72% between 2013 and 2014. In the past 2 years, more malware was found than in the previous 10 years combined. The complexity of Malware is increasing as cybercriminals refine their intrusion techniques and vary attack methods. Zero-day attacks in particular have continued to grow as unknown malware are finding ways to bypass traditional signature-based and sandboxing security measures.

The rise of ransomware has also become a global epidemic. This type of attack continues to accumulate victims worldwide, forcing companies to decide between attempting to recover data or paying significant ransom to hackers. Join our conversation to learn how you secure your organizations network, data and systems by detecting, containing and preventing zero-day attacks via advanced sandboxing techniques. Our dinner will be hosted the evening before the 2016 InfoSec Nashville Conference, so kick off your conference experience by joining us for engaging discussions over dinner.

ISE® PRIVATE DINNER
A Data-Centric Security Approach: Safeguarding Your Data and Ensuring Rapid Recovery From A Breach

September 20, 2016
5:30pm - 8:30pm
The Capital Grille
2223 N Westshore Blvd
Tampa, FL 33607
Registration
Nicholas Shevelyov

Ennis Alvarez
VP of IT Infrastructure
Rooms To Go
Biography

Data Breaches are top of mind for many organizations and their security teams. Hackers continue to take advantage of phishing schemes, malware, and a bevy of other methods to find ways to capture user credentials—rendering the use of access management and encryption solutions alone as ineffective security measures. Additionally, the US and European Union are drafting new legislation that will likely have a major impact on how personal information is protected and shared across borders.

Improved breach detection capabilities alone are not enough. Security teams are investing in solutions that mask or eliminate sensitive data in their environment, and tools that enable quick data recovery to a known good state. Join our conversation and discuss how security teams are implementing data-centric security.

InfoSec Nashville: What Keeps You Up at Night? Potential InfoSec Challenges for CISOs in the Coming Future

September 20, 2016
2:15 pm –3:05 pm
Music City Center
201 5th Avenue South
Nashville, TN 37203
More Details
Marci McCarthy

Marci McCarthy
CEO & President
T.E.N.
Biography

Panelists include:
Jennifer Cole, VP Information Security & Governance, ServiceMaster
Joseph Johnson, CISO, Premise Health
William Crank, CISO, MEDHOST

The Information Security industry started out working with technology as simple as antivirus software and firewalls that succeeded in thwarting adversary attacks. But within the past 10-15 years, the industry has evolved rapidly. Today we must deal with advanced concepts such as the Internet of Things; biometrics; APTs; threat intelligence; and more that require innovative strategies to combat—antivirus and firewalls are no longer enough. Threats to the industry are diligent, and as a result we ask ourselves: where is this leading the industry? What technology must we look for? What must we do to stay on the cutting edge?

ISE® PRIVATE DINNER
Security on the Move: Improving Mobile Device Management

September 21, 2016
5:30pm - 8:30pm
Vic & Anthony’s Steakhouse
1510 Texas Ave
Houston, TX 77002
Registration

Unique to this dinner, guests will have the pleasure of enjoying fine wines paired with the most delicious meals. We will periodically break up the conversation when each wine is brought out for tasting with an appropriately-paired, dinner course. Each pairing will be described and discussed as you partake in them, providing plenty of time to enjoy the combination flavors before we resume discussion.

The explosive proliferation of personal smartphones and tablets in the workplace has exposed companies to increased risks. Mobile systems, the networks they connect to, and the apps they run can all be exploited to steal sensitive information such as documents, calendar appointments, email messages, texts, and attachments. Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones and tablets. Traditional anti-virus and app reputation solutions can identify known threats, but they can’t detect newly created malware or the vulnerabilities in networks, operating systems, and apps. Join our conversation to learn how your organization can better defend against mobile attacks by looking at system vulnerabilities and root access configurations to better defend against malicious apps, Trojans, malware, and man-in-the-middle attacks.

ISE® PRIVATE DINNER
Agility and Automation through Network Security Orchestration

September 21, 2016
5:30pm - 8:30pm
Flank
74, Tower Rd
Waltham, MA 02451
Registration

Modern security applications span across not only physical networks, but also private and public cloud platforms. Security policies and connectivity can no longer be managed in silos and problematic communication gaps between operations and security teams must be bridged. In the current security landscape, InfoSec professionals need to be able to implement changes to the network in minutes instead of days and find ways to maintain effective connectivity and functionality between a vast multitude of applications and devices. Like conductors for a digital age, these security professionals need to be able to tune the various pieces of their security suite to work in accord and produce a solidified and harmonious security solution. Join our conversation to learn how you can use network security policy orchestration to improve visibility and control across your enterprise and tighten security posture to ensure continuous compliance.

ISE® PRIVATE DINNER
The Information Security Iceberg: Demonstrating the True Value of Data Privacy and Security

September 22, 2016
5:30pm - 8:30pm
The Boarding House
720 N Wells St.
Chicago, IL 60654
Registration

Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders, but have we fully uncovered the true value of data privacy and security — or is this the tip of the iceberg? Join us for a candid discussion with your peers as we analyze the legal ramifications and punitive damages of data and security breaches, calculate the impact of cyber risk from a liability and cost perspective and explore real-world challenges in protecting information.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

September 27, 2016
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 E Trade St, Epicentre
Charlotte, NC 28202
Registration

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Preventing a Data Hostage Situation: Developing a Ransomware Preparedness Plan

September 28, 2016
5:30pm - 8:30pm
The Palm
Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Registration
Bob Varnadoe

Bob Varnadoe
Chief Information Security Officer
NCR Corporation
Biography

Ransomware has rapidly emerged as a significant threat to businesses and organizations of all verticals and sizes. In this day and age where data is invaluable, cybercriminals are taking advantage of people who don’t know a lot about malware behavior. Unfortunately, there is no silver bullet when it comes to ransomware. Being prepared to deal with it requires a multilayered, step-by-step approach for the best risk mitigation Join our conversation to learn how you can best protect your organization from ransomware and avoid business disruption, loss of productivity, damage to brand reputation and legal implications that come along with recovering from a ransomware attack.

ISE® PRIVATE DINNER
Protecting your Assets at Risk - Keeping your Assets out of Harm’s Way

September 29, 2016
5:30pm - 8:30pm
Nick & Sam’s
3008 Maple Ave
Dallas, TX 75201
Registration

Today’s enterprises need to get an integrated view of the high-severity threats, critical vulnerabilities, asset value and business context to their most valued assets and the business impact to the organization. Enterprises have invested in multiple technologies to address threats and vulnerabilities. The challenge with these individual technologies is that they provide alerts in isolation. Furthermore, these alerts lack asset context and the potential business impact. To enable an integrated view, enterprises need to shift from a purely technology-based approach to a risk-based asset-centric approach to security. A risk based asset-centric approach involves analyzing and correlating information coming from their existing security tools, adding a layer of user behavior analytics and contextual business information, and then marrying the prioritized threats and vulnerabilities information and sending it to the right stakeholders (incident responders, Line of Business application owners) who can take action to mitigate the risk. Join our conversation to learn how to develop a risk based asset-centric program to better assess, monitor and proactively manage the assets at risk in your organization and reduce attack surface exposure.

ISE® NORTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

October 3, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Registration

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® Northeast Executive Forum and Awards 2016

The ISE® Northeast Executive Forum and Awards 2016 will be held on October 4, 2016 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

October 11, 2016
5:30pm - 8:30pm
Edge Steak & Bar
Four Seasons Hotel Miami
1435 Brickell Ave
Miami, FL 33131
Registration

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

October 20, 2016
5:30pm - 8:30pm
Jacob & Co. Steakhouse
12 Brant St,
Toronto, ON M5V 2M1
Canada
Registration

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® NORTH AMERICA PRIVATE WELCOME DINNER
Orchestrating a Move Away From the Silos

November 8, 2016
5:30pm - 8:30pm
David Burke’s Primehouse
616 N Rush St
Chicago, IL 60611
Registration

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® North America Leadership Summit and Awards 2016

The ISE® North America Leadership Summit and Awards will be held November 9-10, 2016 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details