Upcoming Events

ISE® NORTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

October 3, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Registration
David Ritenour

David Ritenour
Managing Director, CISO
Blackrock Inc.
Biography

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

ISE® Northeast Executive Forum and Awards 2016

The ISE® Northeast Executive Forum and Awards 2016 will be held on October 4, 2016 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

October 11, 2016
5:30pm - 8:30pm
Edge Steak & Bar
Four Seasons Hotel Miami
1435 Brickell Ave
Miami, FL 33131
Registration
Ana Roldan

Ana Roldan
AVP, Chief Information Security Officer
Miami Dade College
Biography

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Transform Complexity into Security: Building a Holistic Insider Threat Program

October 18, 2016
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 E Trade St, Epicentre
Charlotte, NC 28202
Registration

Do you know what your employees are doing at work? The enterprise can no longer rely on a defensible security perimeter. Rapid digitization has driven the evolution of insider risk—especially in complex organizations. With the growth of digital exhaust, security teams need to better understand and manage vast amounts of data in order to protect the business. Recognizing how existing data sources can be utilized in your security strategy and how insider human behavior and activity can be evidence of potential security risks are two of the first main steps in the process. Educating employees and other users in the system on a culture of security follows closely behind. Join RedOwl to learn how your security team can address key questions around the development and implementation of a comprehensive insider threat program.

ISE® PRIVATE DINNER
Orchestrating a Move Away From the Silos

October 20, 2016
5:30pm - 8:30pm
Jacob & Co. Steakhouse
12 Brant St,
Toronto, ON M5V 2M1
Canada
Registration
Bobby Singh

Bobby Singh
VP & CISO
TMX Group Inc.
Biography

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® PRIVATE DINNER
Protecting your Assets at Risk - Keeping your Assets out of Harm’s Way


October 27, 2016
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA 94111
Registration

Many of today’s enterprises approach cyber security from a technology point-of-view. They purchase point solutions which end up operating in siloes, never intersecting. Yet as the business environment becomes even more complex, threat actors become more sophisticated, and more sensitive data needs protection, enterprises must shift their tactics to effectively keep their assets safe. They must adopt a risk-based approach to cyber security which means bringing together threats, vulnerabilities, the value of the assets at risk and other business context to determine where their greatest risk lies and how to reduce it. They must also make security everybody’s business – from security teams to line-of-business application owners that govern valued assets to boards of directors – enabling all parties to do their part in proactively reducing risk. Join our conversation and learn how to develop a risk based cyber security program to better identify, communicate and reduce the risk of your most valued assets from getting breached.

ISE® PRIVATE DINNER
Information Security Iceberg: Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information

November 2, 2016
5:30pm - 8:30pm
The Castaway Burbank
1250 E Harvard Rd.
Burbank, CA 91501
Registration

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. The need to collaborate securely across international boundaries creates additional challenges for your business. Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders. Are we truly safeguarding against data privacy and data security — or are these breaches the tip of the iceberg?

Join us for a candid discussion with your peers as we calculate the impact of information security from a risk and cost perspective and explore real-world challenges in protecting information. We will address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment

ISE® NORTH AMERICA PRIVATE WELCOME DINNER
Orchestrating a Move Away From the Silos

November 8, 2016
5:30pm - 8:30pm
David Burke’s Primehouse
616 N Rush St
Chicago, IL 60611
Registration

“Are you secure and are things getting better or worse?” How would you answer this question? Security teams are inundated with alerts from multiple, siloed products and typically have manual processes and handoffs making it impossible to know what’s important, where to start and the current status of an incident or vulnerability. Linking security and IT together can help organizations deliver more efficient security response, streamline remediation and clearly visualize security posture. Join our conversation to learn how your security team can improve your organization’s security through orchestration methods and create a single platform for responding to security incidents and vulnerabilities – and ultimately reduce risk.

ISE® North America Leadership Summit and Awards 2016

The ISE® North America Leadership Summit and Awards will be held November 9-10, 2016 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details