Archived Events 2018

ISE® PRIVATE DINNER
Securely Empower Productivity and Innovation

February 20, 2018
5:30pm - 8:30pm
The James Kitchen + Bar
616 N Rush St
Chicago, IL 60611
Nicole Ford

Nicole Darden Ford
Global Vice President, IT & CISO
Baxter International, Inc.
Biography

The internet has changed the market landscape for many industries. A variety of companies have decentralized access to information and have transformed how business is done. Innovation is no different. What was once confined to R&D centers, innovation is now expected of every area of an organization. As such, departments are constantly advancing and finding new solutions to existing problems. While this engine is great for a company's productivity, it can also open the door to new risks and the emergence of shadow IT, which in turn becomes a headache for security teams. However, forward thinking companies must not resist this revolution, but rather harness this movement as a force for progress and productivity. As more organizations embrace new innovations, their security teams must in turn, become strategic partners to enable security and progress.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

January 25, 2018
5:30pm - 8:30pm
Jeff Ruby’s Precinct
311 Delta Ave
Cincinnati, OH 45226
Casey Marquette

Casey Marquette
Senior Director, Information Security
CVS Health
Biography

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.

ISE® PRIVATE DINNER
Stop Breaches in Real-Time Based on User Behavior

January 24, 2018
5:30pm - 8:30pm
BLT Steak
201 E Trade St
Charlotte, NC 28202
James Hillier

James Hillier
CISO/ Associate CIO
Central Piedmont Community College

A recent Forrester study noted an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years. These breaches have resulted in billions of compromised user names and passwords, further increasing the risk of subsequent breaches. Armed with these stolen credentials, an attacker has just the camouflage they need to “look” like a legitimate user – where they can infiltrate and move laterally through an organization without raising suspicion. Risk-based security solutions that include integrated machine learning can help IT identify suspicious activity in real-time and respond quickly to stop a potential breach in progress. Join our conversation to learn how machine learning enables access based on user behavior, helping your security team better implement risk-based policy to protect your organization’s entire hybrid IT environment.