Archived Events 2013

ISE® PRIVATE DINNER: Enable Communication & Collaboration Without Sacrificing Security

December 12, 2013
5:30pm - 8:30pm
Metropolitan Grill
820 2nd Ave
Seattle, WA 98104
Zachary Ross

Zachary Ross
Senior Technical Program Manager
Risk Management Services
Amazon
Biography

Today’s security leader is responsible for more than just locking down the perimeter. You must find innovative methods to securely enable business and streamline collaboration, often between numerous facilities and teams scattered around the globe. Unified communication and eCollaboration tools have revolutionized connectivity and productivity, but can also create infrastructure and security challenges for the enterprise. Join our conversation to examine strategies for employing these tools to improve business operations without creating additional risk or sacrificing security.

Executive Roundtable and Reception: Speed & Security — Why CISOs Want an Agile SDLC

December 11, 2013
5:30pm - 8:30pm
Westin Michigan Avenue
909 N Michigan Ave
Chicago, IL 60611
Dan Swartwood

Dan Swartwood
Information Security Governance Leader
Mars
Biography

The future of business is eCommerce. Regardless of industry, size or purpose, more companies and organizations rely on the World Wide Web for transactions and customer engagement than ever before. However, conducting business online requires a fast-paced development process and high demand for services allows minimal downtime for updates and patching. Security must be built into the SDLC from the beginning. Join our roundtable conversation to examine why CISOs and their teams are shifting to a more agile development process and discuss why embedding security early and throughout the SDLC can prevent severe, costly consequences down the road.

ISE® PRIVATE DINNER
Putting Vulnerability and Risk Information in the Context of Business

December 10, 2013
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
John Masserini

John Masserini
Chief Security Officer
MIAX Options
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010

Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

December 5, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post Street
San Francisco, CA 94102
Ramses Martinez

Ramses Martinez
Director of Security
Yahoo!
Biography

Join us for this opportunity to discuss candidly the most serious issues facing information security executives today.  Hear from your peers how they are addressing advanced threats from internal, external and global sources.  And share your insight on protecting your enterprise in an evolving threat landscape.

ISE® PRIVATE DINNER: Is Your Biggest Threat Already Inside Your Network?

December 5, 2013
5:30pm - 8:30pm
The Oceanaire Seafood Room
5061 Westheimer Road
Houston, TX 77056
Derek Rude

Derek Rude
IT Director
Weatherford
Biography

Although the NSA leaks by Edward Snowden will likely be remembered as one of the most significant breaches in history, the basic scenario — an insider exposing and exploiting sensitive data to outsiders (whether intentional or accidental) — is becoming increasingly common. As more companies migrate massive amounts of data into cloud and virtualization environments, the risk increases exponentially. Forrester research reports that insider threats have emerged as the leading cause of data breaches, which leaves CISOs around the world facing an alarming question: “Is your biggest threat already inside your network?” Many organizations assume the answer is yes and are transitioning from a traditional perimeter approach to an “inside-out” model of security with fine grained access controls and role-based monitoring. Join our conversation to discuss this new approach and learn strategies for preparing, preventing, detecting and responding to insider threats in order to better protect enterprise data.   

ISE®PRIVATE DINNER: Risky Business – Why DLP Should be Fundamental to Your Security Strategy

December 4, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 West Olive Avenue
Burbank, CA 91505
Arthur Lessard

Arthur Lessard
SVP, Chief Information Security Officer
Universal Music Group
Biography

Craig  Froelich

Craig Froelich
SVP, Head of Cyber Security Technology
Bank of America

Innovations in mobile and cloud technology enable efficiency and connectivity like never before, but embracing these new tools without strategy is risky business. Greater access from more endpoints means employees create additional vectors for threats to infiltrate the corporate network and for crucial data to be stolen. Without data Loss prevention technology and tactics embedded at the core of their organization’s security strategy, CISOs put the organization at risk for crippling breaches and substantial remediation costs. Join the conversation to learn why DLP should be fundamental to your security strategy and learn best practices to improve visibility into your enterprise’s data loss risk, deliver measurable risk reduction, and stay ahead of emerging threats and new technologies.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

November 21, 2013
5:30pm - 8:30pm
BLT Steak
110 N. College Street
Charlotte, NC 28202
David Barton

David Barton
Senior Director & Head of Information Security
HireRight
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

NIST Cybersecurity Framework Town Meeting Web Conference

November 19, 2013
4:00pm - 5:00pm
Web conference
Phil Agcaoili

Phil Agcaoili
VP, Chief Information Security Officer
Elavon, Inc.
ISE® Central Executive Award Winner 2009
ISE® of the Decade Southeast Award Winner 2012

Biography

Security industry leaders are apprehensively considering implementation of the highly ambitious milestones that are part of the NIST Cyber Security Framework, which includes standards procedures, and guidelines to align business, policy, and technological approaches to cyber risk. With huge changes potentially looming in the not-so-distant future, it is more important than ever for executive thought leaders to communicate and collaborate to ensure the framework enhances security efforts, instead of complicating them by imposing a one-size-fits-all model. During this virtual conversation, CISOs and CSOs from across the U.S. will take a candid look at the preliminary NIST Cybersecurity Framework, discuss possible ideas for improvement, and collectively generate meaningful feedback and suggestions and for the NIST.  

Join Phil Agcaoili and other security industry thought leaders for the “NIST Cybersecurity Framework Town Meeting” via web conference from 4-5 p.m. EST on Tuesday, Nov. 19. During this virtual conversation, CISOs and CSOs from across the U.S. will take a candid look at the preliminary NIST Cybersecurity Framework, discuss possible ideas for improvement, and collectively generate meaningful feedback and suggestions and for the NIST.

ISE® PRIVATE DINNER: The questions you aren’t asking about BYOD — but should be!

November 13, 2013
5:30pm -8:30pm
MacArthur Park
27 University Ave.
Palo Alto, CA 94301
Justin Somaini

Justin Somaini
CISO
Yahoo!
Biography

Many organizations are entirely reactive to BYOD, responding only as pressure from users increases, but BYOD is becoming the standard. Failing to proactively address such a vital issue from both policy and technology standpoints will dramatically diminish your capacity to manage risk. But what are your organization’s unique challenges? How can the element of bring-your-own-software (BYOS) on potentially unknown devices further compromise your network? What role will automation play and how can you enforce policies? Join us for this engaging conversation to learn what questions you should be asking when planning your BYOD strategy in order to ensure success.

ISE® PRIVATE DINNER: Every Second Matters: Using Real-Time Intelligence to Expose Threats

November 12, 2013
5:30pm -8:30pm
The Capital Grille
94 Perimeter Center West
Atlanta, GA 30346
Nick Nedostup

Nick Nedostup
Vice President
Cyber Intelligence Operations Center
Equifax
Biography

In the blink of an eye, malicious threats can wreak havoc throughout your network causing virus outbreaks and major outages that result in substantial costs and compromise employees' time and your organization's reputation. Your team needs instant visibility and accurate, real-time information about the state of your computing assets in order to identify and mitigate threats proactively. But in today's evolving threat landscape, real time is measured in seconds - not hours or days. Join our conversation to discuss the best practices and innovative technology that enable you to collect and utilize this valuable intelligence to preemptively address threats and ultimately improve operational processes, reduce costs and streamline business.

ISE® NORTH AMERICA PRIVATE DINNER
Why Public/Private Partnerships are Key to the Future of Cyber Security

November 5, 2013
5:30pm - 8:30pm
The Capital Grille at Tyson’s Corner
1861 International Drive
McLean, VA 22102
Shelbi Rombout

Shelbi Rombout
Cybersecurity Partnership Executive
U.S. Bank
Biography

From the boardroom to the situation room, cyber security has become a globally visible and divisive issue. As both business and government become increasingly reliant on technology, the need for a strong cyber security framework to protect critical infrastructure also escalates. Although the federal government has initiated legislation to address this hot button issue, the response to today’s cyber threats cannot be limited to Washington. It is an issue of both national and economic security. Join our conversation as we examine why public/private partnerships are a key driver in safeguarding critical assets, managing risk and enabling continued economic growth in environment that protects and nurtures innovation.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

October 24, 2013
5:30pm - 8:30pm
Metropolitan Grill
820 2nd Ave
Seattle, WA 98104
Franklin Donahoe

Franklin Donahoe
Director, Information Security
Costco Wholesale Corporation
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

October 23, 2013
5:30pm - 8:30pm
Coach Insignia
Floors 71 & 72
100 Renaissance Center
Detroit, MI 48243
Bradley Maiorino

Bradley Maiorino
Chief Information Security & Risk Officer
General Motors
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER
Moving from Battalions to SEAL Teams: Shifting Strategies in the Security Talent War

October 22, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
1470 McConnor Parkway
Schaumburg, IL 60173
Brenda Calloway

Brenda Calloway
Executive Director of Information Security
Health Care Service Corporation
ISE® Central Executive Award Finalist 2010
Biography

The challenge of finding, grooming and retaining the best security talent is not new. But as organizations adapt to today’s threat landscape, many find it more difficult than ever to hire enough talent to meet their growing needs. Ensuring the highest yield from each valuable asset is now vital for the CISO. In fact, a recent National Audit Office report indicates it could take 20 years to plug the current cybersecurity skills gap. Join our conversation to discover strategies for increasing the ROI on your existing security team, and discuss ways to reduce your future staffing needs by improving utilization of your biggest asset – the team you have today.

ISE® PRIVATE DINNER: Security in the Data Center

October 16, 2013
5:30pm - 8:30pm
The Palm
1100 S Flower St
Los Angeles, CA 90015
Christine Thomas

Christine Thomas
VP of Technology and Production Infrastructure,
CTO Office for the Entertainment Services Division
Technicolor
Biography

The security of your data center is central to enterprise operations — imperative to sustaining data integrity, maintaining business continuity, and protecting critical information. The convergence of mobile, cloud and traditional technology along with an increasingly transient and dispersed workforce demands an innovative, multi-layered approach. Join the conversation to discover how NextGen CIOs and CISOs can address the evolving complexity of data center security in order to simplify network operations, ensure productivity and enable business.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

October 15, 2013
5:30pm - 8:30pm
Smith & Wollensky
4145 The Strand
Columbus, OH 43219
Steve Collignon

Steve Collignon
Chief Information Security Officer
Senior Vice President, Enterprise Services
Cardinal Health
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Security in the Data Center

October 10, 2013
5:30pm - 8:30pm
Left Bank Brasserie
377 Santana Row
Suite 1100
San Jose, CA 95128
Kevin DePeugh

Kevin DePeugh
Vice President, Cyber Security
Kaiser Permanente
Biography

The security of your data center is central to enterprise operations — imperative to sustaining data integrity, maintaining business continuity, and protecting critical information. The convergence of mobile, cloud and traditional technology along with an increasingly transient and dispersed workforce demands an innovative, multi-layered approach. Join the conversation to discover how NextGen CIOs and CISOs can address the evolving complexity of data center security in order to simplify network operations, ensure productivity and enable business.

ISE® NORTHEAST PRIVATE WELCOME DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

October 2, 2013
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Dr. Yonesy F. Nuñez

Dr. Yonesy F. Nuñez
SVP, Corporate Center IS Risk Management, Global Information Security
CITI
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, " Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business, " learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER
Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!

September 26, 2013
5:30pm - 8:30pm
The Capital Grille
201 North Tryon Street
Charlotte, NC 28202
Max Morris

Max Morris
Senior Vice President
Manager, Cyber Security & Threat Intelligence
Regions Bank
ISE® North America Executive Award Finalist 2009
ISE® Southeast Executive Award Finalist 2009
ISE® North America Executive Award Finalist 2008

Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now! " learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: Big Data and Security

September 26, 2013
5:30pm - 8:30pm
The Palm Restaurant
Westin Hotel in Buckhead
3391 Peachtree Road, NE
Atlanta, Georgia 30326
Ruben D. Chacon

Ruben D. Chacon
Director of Information Protection
Information Risk Management, Global IT
The Coca-Cola Company
Biography

Symantec and Accenture host this special program for the area's leading Information Security Executives® to candidly discuss "Big Data and Security." Explore how organizations are prioritizing and quickly responding to the most critical vulnerabilities that threaten their business by establishing a security strategy and roadmap that includes continuous, up-to-date insight across the security stack and provides actionable, orchestrated security intelligence by leveraging existing or new security infrastructure.

CYBERSTRAT 13 NYC - The Art of Cyberwar: Managing Complexity

September 24, 2013
5:30pm - 8:30pm
Westin Times Square
270 West 43rd Street
New York, NY 10036
Details
John Pescatore

John Pescatore
Director of Emerging Security Trends
SANS/Gartner
Biography

Our digital dependence breeds vulnerabilities that can be exploited by criminals, hackers, hacktivists, and well-resourced nations and non-state organizations; therefore, our critical systems must be robust in the face of motivated persistent hackers and resilient enough to withstand attacks and quickly recover. As threats continue to evolve in complexity and frequency, we must develop and deploy both offensive and defensive tactics as part of a balanced cyber security strategy in order to protect the enterprise.

ISE® CANADA PRIVATE WELCOME DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

September 18, 2013
5:30pm - 8:30pm
Harbour Sixty
60 Harbour St.
Toronto, ON M5J 1B7
Kenneth Haertling

Kenneth Haertling
VP & Chief Security Officer
TELUS
ISE® Canada Executive Award Finalist 2013
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business, "learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: Why the CISO’s Role is Fundamental to Software Security

September 12, 2013
5:30pm - 8:30pm
Chicago Chop House
60 W. Ontario St.
Chicago, IL 60654
Jasper Ossentjuk

Jasper Ossentjuk
Chief Information Security Officer
HSBC North America
Biography

The security landscape has changed considerably in recent years and sophisticated attackers have become adept at exploiting software bugs and architectural flaws in software applications. It is more important than ever to integrate security throughout the SDLC in order to ensure the long-term protection of sensitive information and reduce the cost of remediation. The CISO plays a fundamental role in developing an organization’s comprehensive security strategy and is the key driver for incorporating security principals into the development process. Learn how to foster a commitment to security within the development community and how to best protect your software against threats with an end-to-end software security program.

ISE® PRIVATE DINNER: Using Security Intelligence for a Competitive Advantage

September 10, 2013
5:30pm - 8:30pm
The Capital Grille
801 Hennepin Avenue
Minneapolis, MN 55402
Steven Jensen

Steven Jensen
VP and Chief Information Security Officer
Ameriprise Financial
ISE® North America Commercial Executive Award Finalist 2013
Biography

Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

ISE® PRIVATE DINNER: Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence

August 22, 2013
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Denise Hucke

Denise Hucke
Vice President, Global Operational Risk
ADP
Biography

Skip Foss

Skip Foss
COO and General Manager
Norse Corporation
Biography

Sponsored by Norse Corporation, this special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, "Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.

ISE® PRIVATE DINNER: Empower Business by Embracing Mobility

August 15, 2013
5:30pm - 8:30pm
Jacob’s & Co. Steakhouse
12 Brant St.
Toronto, ON MSV 2M1
Robert Stonehouse

Robert Stonehouse
Managing Director, Information Security
TMX Limited
Biography

The growing use of smartphones and tablets along with Bring Your Own Device (BYOD) initiatives are fundamentally changing the way we do business. However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. This discussion will explore strategies for embracing BYOD in business without compromising on security, so that employees can capitalize on mobility’s many benefits — improved productivity, collaboration and innovation.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

August 13, 2013
5:30pm - 8:30pm
Max Downtown
City Place
185 Asylum Street
Hartford, CT 06103
Jim Routh

Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
ISE® Northeast Executive Award Finalist 2014
ISE® North America Executive Award Winner 2014 - Health Care Category

Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® West Welcome Dinner
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

August 5, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St.
San Francisco, CA 94102
Joe Bennett

Joe Bennett
CISO, VP of Enterprise IT and Information Security
YP
Tucker, GA
Biography

Laz Lazarikos

Laz Lazarikos
IT Security Strategist and Former CISO
Sears Online Business Unit
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business," learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® VIP Programs at Black Hat Conference 2013

July 31 - August 1, 2013
Las Vegas, NV

T.E.N. is hosting several ISE VIP Programs at the 2013 Black Hat Conference in Las Vegas. Hosted by many of our ISE Alumni and courtesy of our sponsors, these programs include special breakfast and and exclusive receptions. Details

ISE® PRIVATE DINNER: Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!

July 24, 2013
5:30pm - 8:30pm
The Oval Room
800 Connecticut Ave NW
Washington, DC 20006
name

Stacey Halota
Vice President, Information Security and Privacy
The Washington Post
ISE® Mid-Atlantic Commercial Executive Award Winner 2009
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: Putting Vulnerability and Risk Information in the Context of Business

July 23, 2013
5:30pm - 8:30pm
Morton’s
1470 McConnor Parkway
Schaumburg, IL 60173
Kyle Bellin

Kyle Bellin
VP, Information Security and Privacy
Popular Community Bank
Biography

Vulnerability management technologies are an essential component of risk reduction for security-conscious organizations worldwide. However, high volumes of rigid data and static reports are problematic for security leaders struggling to protect their organizations, achieve compliance, deploy resources and communicate risk across the enterprise. Discussion will focus on delivering the right information, defining the business context of your assets, and prioritizing the people, processes and technology needed to both mitigate security exposures and measure efficacy of your vulnerability management program over time.

ISE® PRIVATE DINNER
Long Story Short: Secure Mobility is About the Data

July 13, 2013
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
5061 Westheimer Road, Suite 8060
Houston, Texas 77056
Adam Ely

Adam Ely
Co-Founder & COO
Bluebox
Biography

The dinner discussion, "Long Story Short: Secure Mobility is About the Data," will address the challenges of mobile device management. Join us to learn more about the first MDM solution to deliver transparent corporate control and visibility of data with a brilliant user experience and find out why Bluebox was listed as one of “CIO's 12 Must-watch Security Start-ups for 2013."

ISE® PRIVATE DINNER
The Principles of Persistence: How Attackers Remain in the Network

June 26, 2013
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
25 East Ohio Street
Chicago, IL 60654
Craig Shumard

Craig Shumard
Principal
Shumard Associates
ISE® Tri-State Award Winner 2005
ISE® Luminary Leadership Award Winner 2010

Biography
T.E.N. Success Story

Targeted attacks against companies differ from disruptive malware incidents in that there is an attacker at the keyboard. The risk and severity of these types of attacks can also have a far greater negative financial impact to a company because the attacker’s goal is to attain and maintain unauthorized access despite the use of traditional security tools. There is great value in information and they are highly motivated to have access to it. Whether it is exfiltrating sensitive IP or gathering intelligence for a competitive advantage, their ability to maneuver freely and remain undetected ensures they are able to profit at your expense for years. This discussion will feature an engaging peer discussion regarding best practices for detecting nefarious infiltration, identifying lateral movement techniques and responding to advanced persistent attacks within your network.

ISE® PRIVATE DINNER: Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence

June 25, 2013
5:30pm - 8:30pm
Morton’s the Steakhouse
618 Church Street
Nashville, TN 37219
Kyle Duke

Kyle Duke
Information Security Officer
HealthSpring
ISE® Southeast People's Choice Award Winner 2010
Biography
T.E.N. Success Story

Skip Foss

Skip Foss
COO and General Manager
Norse Corporation
Biography

Denise Hayman

Denise Hayman
Senior Vice President of Sales and Marketing
Norse Corporation
Biography

Sponsored by Norse Corporation, this special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, "Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.

ISE® PRIVATE DINNER
Long Story Short: Secure Mobility is About the Data

June 20, 2013
5:30pm - 8:30pm
The Palm Restaurant
Westin Buckhead Hotel
3391 Peachtree Road, NE
Atlanta, GA 30326
Tony Spurlin

Tony Spurlin
CISO & Director of Information Security
Autotrader Group
Atlanta, GA
ISE® North America People's Choice Award Winner 2005
Biography

Caleb Sima

Caleb Sima
CEO and Founder
Bluebox
Biography

The dinner discussion, "Long Story Short: Secure Mobility is About the Data," will address the challenges of mobile device management. Join us to learn more about the first MDM solution to deliver transparent corporate control and visibility of data with a brilliant user experience and find out why Bluebox was listed as one of “CIO's 12 Must-watch Security Start-ups for 2013."

ISE® PRIVATE DINNER: Compliance Does not Equal Security

June 19, 2013
5:30pm - 8:30pm
Capital Grille
201 North Tryon Street
Charlotte, NC 28202
Dick Langford

Dick Langford
VP, Information Security Officer
BB&T
Biography

This special dinner will provide for a candid exchange of the hottest issues for today's leading Information Security Executives®. Our dinner topic of conversation, "Compliance Does not Equal Security," will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT and social media.

ISE® PRIVATE DINNER
Making the GRC Grade ­ How to Realize Continuous Compliance

June 18, 2013
5:30pm - 8:30pm
Palm Too
840 Second Avenue
New York, NY 10017
Kevin McGee

Kevin McGee
Senior Vice President, IT Governance and CISO
CIT Group
Biography

Sponsored by McAfee & ForeScout, this special dinner, "Making the GRC Grade:­ How to Realize Continuous Compliance," will provide a forum for candid discussions regarding innovative approaches you can use to not only better effectuate IT-GRC controls, but also achieve continuous compliance. Key topics will include common endpoint compliance gaps; NAC integration with host-based security and policy management systems; extension of correlation rules to expedite IT response and remediation; and closed-loop endpoint security and compliance program creation.

ISE® PRIVATE DINNER: Protecting Data Anywhere

June 11, 2013
6pm - 9pm
Delmonico Steakhouse
The Venetian
3355 Las Vegas Blvd South
Las Vegas, NV 89109
Julie Talbot-Hubbard

Julie Talbot-Hubbard
VP, Chief Security Officer
Symantec
ISE® Central Executive Award Winner 2010
Biography
T.E.N. Success Story

Hosted by Symantec and HP, this special dinner discussion, "Protecting Data Anywhere,will be held concurrent with the HP Discover Conference. (Note: Conference pass not required for attendance.) During the conversation we will explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® Central Private Welcome Dinner

June 5, 2013
5:30pm - 8:30pm
Harbour Sixty
60 Harbour St.
Toronto, ON M5J 1B7
Kenneth Haertling

Kenneth Haertling
VP & Chief Security Officer
TELUS
ISE® Canada Executive Award Finalist 2013
Biography

Sponsored by Stonesoft, this special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business," learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER
Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence

May 29, 2013
5:30pm - 8:30pm
ABSINTHE Brasserie & Bar
398 Hayes Street @ Gough
San Francisco, CA 94102
Sam Glines

Sam Glines
Co-founder & CEO
Norse Corporation
Biography

This special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, ;"Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.

ISE® PRIVATE DINNER: Compliance Does not Equal Security

May 22, 2013
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
2525 West End Ave.
Nashville, TN 37203
Bob Quandt

Bob Quandt
Information Security Executive Director
Healthways
Biography

This special dinner will provide for a candid exchange of the hottest issues for today's leading Information Security Executives®. Our dinner topic of conversation, "Compliance Does not Equal Security," will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT and social media.

ISE® PRIVATE DINNER: Protecting Data Anywhere

May 21, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
1470 McConnor Parkway
Schaumburg, IL 60173
Todd Fitzgerald

Todd Fitzgerald
Director of Global Information Security
Manpower Group
2005 ISE® Central Finalist
2006 ISE® Central MC & Judge
2008 ISE® West MC
2012 ISE® North America MC
Security Author

Biography

Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

Collabor8: Enabling BYOD without Sacrificing Network Security

May 16, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
1710 Wynkoop St
Denver, CO 80202
Artie Wilkowsky

Artie Wilkowsky
Director of Global Information Assurance & Risk
First Data Corporation
Biography

This living room style discussion will provide for a candid discussion on one of the industry’s hottest topics, "Enabling BYOD Without Sacrificing Network Security.” Productivity and flexibility versus data and network protection — it’s the perpetual challenge Information Security Executives® face with a growing demand for personal devices in corporate environments. Join us as we explore how embracing employee-owned devices in the corporate environment does not need to be an all or nothing approach, but rather how your business can take incremental steps to protect the network while still giving your employees the access they want to be productive in an always-on work environment.

ISE® PRIVATE DINNER: Protecting Data Anywhere

May 15, 2013
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Roland Cloutier

Roland Cloutier
Vice President, Chief Security Officer
ADP
ISE® Northeast Executive Award Winner 2012
ISE® Northeast People's Choice Award Winner 2012
ISE® North America Commercial Executive Award Winner 2012
ISE® North America Executive Award Winner 2014 - Financial Category

Biography
T.E.N. Success Story

Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

May 14, 2013
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 West Olive Avenue
Burbank, CA 91505
Michael Dierickx

Michael Dierickx
Director Product Information Security
Panasonic Avionics Corporation
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER
The Principles of Persistence: How Attackers Remain in the Network

May 7, 2013
5:30pm - 8:30pm
Ruth's Chris Steak House
The Embassy Suites Buckhead
3285 Peachtree Rd NE
Atlanta, GA 30305
Tim Callahan

Tim Callahan
Senior Vice President, Enterprise Business Continuity and Information Assurance,
SunTrust
ISE® Northeast People's Choice Award Winner 2009, ISE® North America Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2007, ISE® Southeast People's Choice Award Winner 2006, ISE® Southeast Executive Award Finalist 2006
Biography
T.E.N. Success Story

Targeted attacks against companies differ from disruptive malware incidents in that there is an attacker at the keyboard. The risk and severity of these types of attacks can also have a far greater negative financial impact to a company because the attacker’s goal is to attain and maintain unauthorized access despite the use of traditional security tools. There is great value in information and they are highly motivated to have access to it. Whether it is exfiltrating sensitive IP or gathering intelligence for a competitive advantage, their ability to maneuver freely and remain undetected ensures they are able to profit at your expense for years. This discussion will feature an engaging peer discussion regarding best practices for detecting nefarious infiltration, identifying lateral movement techniques and responding to advanced persistent attacks within your network.

ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

April 18, 2013
5:30pm - 8:30pm
Wildfire
2001 International Dr
McLean, VA 22102
Frank Aiello

Frank Aiello
Chief Information Security Officer
American Red Cross
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER
Making the GRC Grade ­ How to Realize Continuous Compliance

April 17, 2013
5:30pm - 8:30pm
Chamberlain’s Steak & Chop House
5330 Belt Line Rd
Dallas, TX 75254
Eric Fisch

Eric Fisch
Senior Vice President, Information Security
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013

Biography

Sponsored by McAfee & ForeScout, this special dinner, "Making the GRC Grade:­ How to Realize Continuous Compliance," will provide a forum for candid discussions regarding innovative approaches you can use to not only better effectuate IT-GRC controls, but also achieve continuous compliance. Key topics will include common endpoint compliance gaps; NAC integration with host-based security and policy management systems; extension of correlation rules to expedite IT response and remediation; and closed-loop endpoint security and compliance program creation.

ISE® PRIVATE DINNER
Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence

April 11, 2013
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street
Suite C-110
Charlotte, NC 28202
Sam Glines

Sam Glines
Co-founder & CEO
Norse Corporation
Biography

This special dinner will provide a forum for candid dialogue on the industry's most critical issues. During our dinner conversation, ;"Increasing Business Security and Reducing Fraud via Live Cyber Threat Intelligence," learn innovative approaches to drastically reduce e-commerce fraud and raise the security posture of current network security systems built on reactive models and data that is static or out of date. Key discussion topics will also include strategies for increasing the efficacy of traditional security technologies via live threat intelligence, which adapts to constantly changing Internet threats, and methods of controlling the level of acceptable risk by transaction.

ISE® PRIVATE DINNER: Bringing IT Back to Relevance

April 10, 2013
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson Street
San Francisco, CA
John Rymer

John Rymer
VP, Principal Analyst Serving Application
Development & Delivery Professionals
Forrester
Biography

The pressure to deliver new, innovative business applications has never been greater for IT organizations. Imagine being able to alleviate reoccurring maintenance issues and respond immediately to rapidly changing business requests – all while improving the overall efficiency and abilities of core systems to work and integrate with each other. Isn’t it about time to transform your IT department into a business differentiator and center of innovation?

ISE® PRIVATE DINNER
Building Consensus - How do you establish a common set of Information Security facts?

April 4, 2013
5:30pm - 8:30pm
Z’s Oyster Bar and Steakhouse
115 South 4th Street
Louisville, KY 40202
Chuck Deaton

Chuck Deaton
Director, Enterprise Information Security
Humana
Biography

This special dinner will provide for a candid exchange of the dinner topic of conversation, "Building Consensus - How do you establish a common set of Information Security facts?" will share strategies for establishing a consistent and common sets of facts from data that can be can be leveraged for a cross section of audiences and stakeholders, as well as best practices utilizing continuous monitoring to address the new threats of today and tomorrow.

ISE® PRIVATE DINNER
The Principles of Persistence: How Attackers Remain in the Network

April 3, 2013
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Craig Shumard

Craig Shumard
Principal
Shumard Associates
ISE® Tri-State Award Winner 2005
ISE® Luminary Leadership Award Winner 2010

Biography
T.E.N. Success Story

Targeted attacks against companies differ from disruptive malware incidents in that there is an attacker at the keyboard. The risk and severity of these types of attacks can also have a far greater negative financial impact to a company because the attacker’s goal is to attain and maintain unauthorized access despite the use of traditional security tools. There is great value in information and they are highly motivated to have access to it. Whether it is exfiltrating sensitive IP or gathering intelligence for a competitive advantage, their ability to maneuver freely and remain undetected ensures they are able to profit at your expense for years. This discussion will feature an engaging peer discussion regarding best practices for detecting nefarious infiltration, identifying lateral movement techniques and responding to advanced persistent attacks within your network.

ISE® PRIVATE DINNER : Security Metrics Aligned with Business Initiatives

March 26, 2013
5:30pm - 8:30pm
Fleming's Prime Steakhouse
25 East Ohio Street
Chicago, IL 60654
Robert Allen

Robert Allen
Chief Information Security Officer
CNA Insurance
Biography

Business initiatives often require investments in IT security, yet those investments are not always fully understood or supported by executive leadership and boards of directors. Successful security leaders are able to frame these investments in terms of business advantages, which helps other organizations and non-security professionals comprehend business alignment between budget support for IT security and business initiatives. During our dinner conversation, "Security Metrics Aligned with Business Initiatives," discuss with your executive peers best practices for leveraging security performance metrics to enable and support business decisions and key initiatives.

ISE® PRIVATE DINNER: Protecting Data Anywhere

March 19, 2013
5:30pm - 8:30pm
The Capital Grille
1301 4th Avenue
Seattle, WA 98101
Cris Ewell

Cris Ewell
Chief Information Security Officer
Seattle Children's
ISE® North America Health Care Executive Award Winner 2012
Biography

Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® SOUTHEAST PRIVATE WELCOME DINNER: Applying Cyber Offense and Defense to Protect Business

March 13, 2013
5:30pm - 8:30pm
The Palm Restaurant at the
Westin Buckhead Hotel

3391 Peachtree Road, NE
Atlanta, Georgia 30326
Robert Mims

Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® VIP Programs at RSA Conference 2013

T.E.N. had several ISE VIP Programs at the 2013 RSA Conference held February 24 - 28, 2013 in San Francisco. Hosted by many of our ISE Alumni and courtesy of our sponsors, these programs included special breakfast and private luncheons; premiere seating at RSA keynote presentations and exclusive receptions. Details

ISE® PRIVATE DINNER: Protecting Data Anywhere

February 21, 2013
5:30pm - 8:30pm
The Capital Grille
444 Brickell Avenue
Miami, FL 33131
Connie Barrera

Connie Barrera
Director of Information Security and Compliance
University of Miami
ISE® North America Executive Award Finalist 2013 - Academic/Public Sector Category
Biography

Symantec and HP host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

February 20, 2013
5:30pm - 8:30pm
The Seafire Grill
158 E 48th Street
New York, NY 10017
John Masserini

John Masserini
Chief Security Officer
Miami International Holdings
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010

Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

Collabor8: Enabling BYOD without Sacrificing Network Security

February 19, 2013
5:30pm - 8:30pm
Westin Galleria Dallas
13340 Dallas Parkway
Dallas, TX 75240
Gene Scriven

Gene Scriven
Chief Information Security Officer and Vice President
Sabre Holdings
ISE® Southeast People’s Choice Award Winner 2008
ISE® Southeast Executive Award Finalist 2008

Biography
T.E.N. Success Story

The dinner topic of conversation, "Enabling BYOD without Sacrificing Network Security" will explore how embracing employee-owned devices in the corporate environment does not need to be an all or nothing approach, but rather how your business can take incremental steps to protect the network while still giving your employees the access they want to be productive in an always-on work environment.

ISE® PRIVATE DINNER: Big Data and Security

February 13, 2013
5:30pm - 8:30pm
Fleming’s Prime Steakhouse and Wine Bar
210 East Trade Street Suite C110
Charlotte, NC 28202
Rich Baich

Rich Baich
Chief Information Security Officer, Enterprise Technology Services
Wells Fargo & Company
ISE® Georgia Executive Award Winner 2004
Biography

Symantec hosts this special program for the area's leading Information Security Executives® to candidly discuss "Big Data and Security." Explore how organizations are prioritizing and quickly responding to the most critical vulnerabilities that threaten their business by establishing a security strategy and roadmap that includes continuous, up-to-date insight across the security stack and provides actionable, orchestrated security intelligence by leveraging existing or new security infrastructure. This program will be tailored to primarily address current issues and hot topics faced by security executives in the financial services industry.

ISE® PRIVATE DINNER: Protecting Data Anywhere

February 12, 2013
5:30pm - 8:30pm
Fleming’s Prime Steakhouse and Wine Bar
210 East Trade Street Suite C110
Charlotte, NC 28202
Bobby Singh

Bobby Singh
Associate Vice President, Security Program Executive

ISE® Canada People's Choice Award Winner 2013
Biography

Symantec and HP Enterprise Services host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® PRIVATE DINNER
Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business

February 7, 2013
5:30pm - 8:30pm
Smith & Wollensky
4007 Westheimer at Highland Village
Houston, TX 77027
Robert Mims

Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
ISE® Southeast People's Choice Award Winner 2014
Biography

This special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, “Destructive Malware, Foreign Attacks, Denial of Service Attacks: What You Should Do Now!" learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

ISE® PRIVATE DINNER: Protecting Data Anywhere

January 31, 2013
5:30pm - 8:30pm
Chamberlain's Fish Market Grille
4525 Belt Line Road
Addison, TX 75001
Scott Howitt

Scott Howitt
VP, CISO
J.C. Penney
ISE® Central Executive Award Winner 2012
Biography
T.E.N. Success Story

Symantec and HP Enterprise Services host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® PRIVATE DINNER: Enabling BYOD without Sacrificing Network Security

January 29, 2013
5:30pm - 8:30pm
Absinthe Brasserie & Bar
398 Hayes Street at Gough
San Francisco, CA 94102
Niall Browne

Niall Browne
CSO & VP of Information Security
Workday
Biography

The dinner topic of conversation, "Enabling BYOD without Sacrificing Network Security" will explore how embracing employee-owned devices in the corporate environment does not need to be an all or nothing approach, but rather how your business can take incremental steps to protect the network while still giving your employees the access they want to be productive in an always-on work environment.

ISE® TV Premier: The Value of Predictive Security Intelligence

January 24, 2013
3:00pm EST
Register to watch the
On-Demand Video
Mike Yaffe

Mike Yaffe
Director of Marketing
Core Security
Biography

Jerry Archer

Jerry Archer
Senior Vice President, Chief Information Security Officer
Sallie Mae
ISE® North America Commercial Executive Award Winner 2011
Biography

Pete Lindstrom

Pete Lindstrom
Research Director Security Products
IDC
Biography

This exciting new opportunity brings the knowledge and value you expect from ISE® Programs into a convenient, online format easily accessed from your office or mobile device. Join our experts for this unique program as they examine the integration of full-scale attack planning, threat simulation and attack replication for the purpose of garnering upper-management support, optimizing efficiency and investments in people and technology, and uniting security and business risks. Afterward, continue the conversation online for a candid peer discussion about "The Value of Predictive Security Intelligence.”

ISE® PRIVATE DINNER : A New Paradigm for Data Protection

January 23, 2013
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
(between 8th-9th Avenue)
New York, NY 10036
Mark Risoldi

Mark Risoldi
Managing Director
JP Morgan Chase & Co.
Biography

Our dinner topic of conversation, “A New Paradigm for Data Protection,” will address the latest strategies for best protecting your most critical asset — your data. Learn to unlock the value of your data by securely using and distributing it across any device to any stakeholder; and move away from traditional IT security methodologies, enabling open use and management of data in the most secure manner.

ISE® PRIVATE DINNER: Protecting Data Anywhere

January 22, 2013
5:30pm - 8:30pm
Ruth’s Chris Steak House
The Embassy Suites Buckhead
3285 Peachtree Rd NE
Atlanta, GA 30305
Phil Agcaoili

Phil Agcaoili
Chief Information Security Officer
Cox Communications
ISE® Central Executive Award Winner 2009
ISE® of the Decade Southeast Award Winner 2012

Biography

Symantec and HP Enterprise Services host this special program for the area's leading Information Security Executives® to candidly discuss "Protecting Data Anywhere." Explore methods for optimizing security processes that identify vulnerabilities and shield against attacks against data in both corporate IT or cloud infrastructure as well as when data moves across environments and through various communications methods.

ISE® PRIVATE DINNER : Risk is a Four Letter Word

January 16, 2013
5:30pm - 8:30pm
Z's Oyster Bar & Steakhouse Downtown
115 South 4th Street
Louisville, KY 40202
Stacy Mill

Stacy Mill
Director, Global IT Security
YUM! Brands, Inc.
Biography

Sponsored by HP Enterprise Services, the program will provide a private forum for the area’s leading Information Security Executives® to candidly discuss many of the industry’s hottest issues. Our dinner topic of conversation, "Risk is a Four Letter Word" will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT, and social media.

ISE® PRIVATE DINNER: Big Data and Security

January 15, 2013
5:30pm - 8:30pm
Morton's The Steakhouse
1470 McConnor Parkway
Schaumburg, IL 60173
Cynthia Whitley

Cynthia Whitley
Information Technology Risk Officer and Compliance Leader
Allstate
ISE® Central Finalist 2008
Biography

Symantec and Accenture host this special program for the area's leading Information Security Executives® to candidly discuss "Big Data and Security." Explore how organizations are prioritizing and quickly responding to the most critical vulnerabilities that threaten their business by establishing a security strategy and roadmap that includes continuous, up-to-date insight across the security stack and provides actionable, orchestrated security intelligence by leveraging existing or new security infrastructure.

ISE® PRIVATE DINNER: Compliance Does not Equal Security

January 10, 2013
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
& Wine Bar

103 Summit Blvd.
Birmingham, AL 35243
Tim Searcy

Tim Searcy
Chief Information Security Officer
Protective Life
Biography

This special dinner will provide for a candid exchange of the hottest issues for today's leading Information Security Executives®. Our dinner topic of conversation, "Compliance Does not Equal Security," will address the latest cyber security challenges, threats and security solutions available for mobility, cloud computing, consumerization of IT and social media.