Upcoming Events

ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security

July 14, 2015
5:30pm - 8:30pm
Mastro’s Steakhouse
8852 East Pinnacle Peak Road
Scottsdale, AZ 85255
Registration
Jerry Dixon

Jerry Dixon
Vice President, Security Incident Response
American Express

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® PRIVATE DINNER : The Evolving Challenge of Third Party Security Risk Management

July 15, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
25 East Ohio Street
Chicago, IL 60611
Registration
Larry Lidz

E. Larry Lidz
Assistant Vice President, Information Security
CNA Insurance
Biography

Industry experts estimate that third-party security breaches are growing at an astounding rate, leading many to believe that a firm’s level of cybersecurity is only as good as the security of its vendors. To be successful, CISOs must work with, not against, partners to effectively remediate immediate threats and lower collective security risk. Join our conversation to discuss how to better protect your organization from third party threats by adding continuous monitoring to your arsenal and adopting practices for collaborative intervention and remediation.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 16, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
7550 High Cross Blvd.
Columbus, OH 43235
Registration
Julie Lucas

Julie Lucas
VP, IT Security
The Huntington National Bank
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

July 21, 2015
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center West
Dunwoody, GA 30346
Registration
Carlos Batista

Carlos Batista
Group Vice President, Security Operations & Intelligence
SunTrust Banks
Biography

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
Modernize Your Enterprise: Orchestrating a Secure, Heterogeneous Network

July 28, 2015
5:30pm - 8:30pm
The Capital Grille
500 Crescent Ct.
Dallas, TX 75201
Registration
 

Networks have become progressively more complex and require constant transformation as new threats emerge. With network environments in a state of flux, security teams need to address continuing modernization and business operation’s needs, such as supporting applications teams, migrating data centers, troubleshooting connectivity problems and preparing for audits. In addition to that, many organizations have begun the process of implementing plans for IT transformation initiatives, including virtualization and cloud computing. Even for well-trained and seasoned security teams, adding these processes – in addition to the already time consuming efforts of network monitoring and information security – can become a daunting task. Join our conversation to learn how to modernize your enterprise through tight security posture, rapid service delivery and regulatory compliance across all platforms.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 29, 2015
5:30pm - 8:30pm
Morton’s The Steakhouse
1511 6th Ave
Seattle, WA 98101
Registration
Bill Boni

Bill Boni
Vice President and Corporate Information Security Officer
T-Mobile USA
ISE® North America Commercial Executive Award Finalist 2007
ISE® Central Executive Award Winner 2007

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 30, 2015
5:30pm - 8:30pm
The Capital Grille
301 5th Avenue
Pittsburgh, PA 15222
Registration
Frank Donahoe

Franklin Donahoe
Chief Information Security Officer
Mylan
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Agile Security: Building A Faster, Stronger, More Responsive Model

August 4, 2015
5:30pm - 8:30pm
Bouchon Bistro at The Venetian Resort & Casino
3355 Las Vegas Boulevard South
Venezia Tower, 10th Floor
Las Vegas, NV 89109
Registration
David Cass

David Cass
SVP & Chief Information Security Officer
Elsevier
ISE® Northeast People's Choice Award Winner 2013
Biography

Enterprises continue to invest heavily in virtual and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of cloud benefits, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to develop a more agile, efficient and effective security infrastructure to enable your enterprise to fully capitalize on the many benefits of Infrastructure-as-a-Service (IaaS).

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 11, 2015
5:30pm - 8:30pm
Donovan’s Steak and Chop House
3101 East Camelback Road
Phoenix, Arizona 85016
Registration
 

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 12, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Registration

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

August 13, 2015
5:30pm - 8:30pm
The Palm Restaurant
1750 Tyson's Boulevard
McLean, VA 22102
Registration

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security

August 18, 2015
5:30pm - 8:30pm
The Capital Grille
4740 Jefferson St.
Kansas City, MO 64112
Registration

Don Ainslie
Vice President, Security, Privacy and Risk
DST Systems

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® WEST PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

August 19, 2015
5:30pm - 8:30pm
Morton's Steakhouse
400 Post Street
San Francisco, CA 94102
Registration

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 25, 2015
5:30pm - 8:30pm
Elway’s Downtown
1881 Curtis Street
Denver, CO 80202
Registration

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® West Executive Forum and Awards 2015

The ISE® West Executive Forum and Awards 2015 will be held on August 20, 2015 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2015

The ISE® Northeast Executive Forum and Awards 2015 will be held on October 8, 2015 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

November 5, 2015
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
250 Northern Ave
Boston, MA 02210
Registration
Larry Wilson

Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 -
Academic/Public Sector Category

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® North America Leadership Summit and Awards 2015

The ISE® North America Leadership Summit and Awards will be held November 10-11, 2015 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details