ISE® CENTRAL WELCOME COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected
Central Region: Alabama, Arkansas, Illinois, Iowa, Kansas, Kentucky, Louisiana, Minnesota, Mississippi, Missouri, Nebraska, North Dakota, Oklahoma, South Dakota, Tennessee, Texas, Wisconsin
Invitation only. If you are interested in attending, please contact: Deb Jones.
ISE® VIP Hosts:
Sr. Director, Information Security
Ameriprise Financial Services, Inc.
Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.
Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.
Wednesday, September 2, 2020
1:00 PM CT: ISE® Digital Lounge Opens (Networking & Sponsor Visits)
The ISE® Digital Lounge—which remains open before, during, and after the ISE® Central Digital Executive Forum & Awards—allows executives and our sponsors to network with one another and share information.
Executives who check in with each sponsor will receive a “stamp” for their virtual ISE® Digital Passport and be entered in the Passports-for-Prizes raffle (winners announced the following day).
2:00 PM CT: Executive Forum Begins: Opening Remarks
T.E.N.'s CEO & President will welcome guests and provide an overview of the program agenda for the ISE® Central Executive Forum and Awards 2020.
2:05 PM CT: Keynote Address
What has 2020 Taught Us
Chief Information Security Officer
The Kraft Heinz Company
ISE® Central Executive of the Year Award Winner 2019
ISE® North America Executive: Financial Award Finalist 2019
Nobody could have predicted how 2020 would turn out… unless you were a time traveling doctor. Many of us had to modify our 2020 goals and aspirations to align to the global and organizational impact. Join our discussions as Ricardo Lafosse reflects on his own experiences in 2020; the lasting impact it has had on security programs and—most importantly—the people (security teams and new stakeholders); and how this will become the new normal for many of us in the future.
2:20 PM CT: Interactive Executive Roundtables
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.
What’s Your Handle? Locking Down Our Online Identities With Digital Security
VP, Information Security & CISO
Discussion involving how enterprise security teams can utilize digital security and encourage good security behaviors to help employees protect their online identities during professional and personal usage to stay safe and secure remotely.
To Trust or Not to Trust: Rooting Out Data Manipulation, Exfiltration and Misinformation
Senior Vice President, Chief Information Officer & Chief Information Security Officer
U.S. Retirement and Benefits Partners
Discussion surrounding both security and privacy’s role in data protection while employees work from home, what to do in the event of a breach and how we can be more diligent in detecting when data is being externally manipulated, exfiltrated or used to spread misinformation.
Building a SOC: What Does Your Enterprise Need Today to Prepare for the Future?
Chief Information Officer/Chief Security Officer
Discussion about the best practices to build an enterprise SOC with today’s budget constraints and remote challenges; the possibilities of insourcing, outsourcing or adopting a hybrid approach; and how to obtain top-down support from the start.
2:40 PM CT: ISE® Central Nominee Showcase Presentation #1
A CyberSOC to Enable the Digital Journey
Cyber Security Operation Center Manager, Western Hemisphere
Cyber Security Operations Manager
As a large, global organization undergoing digital transformation, Schlumberger needed to more effectively prioritize and manage an increasing number of security alerts and a shortage of talent while maintaining a more consistent process for alert handling and response. The CyberSOC project deployed a Next Generation Cyber Security Operations Center using cutting-edge technologies and promoting Schlumberger Cyber Security as a differentiating capability to enable Schlumberger’s Digital transformation journey. Join us as we learn how Schlumberger introduced orchestration, automation, and best-in-class tools to increase the number of incidents handled per month by up to 10× within the first year, while also increasing the engagement and motivation of the team.
2:55 PM CT: ISE® Central Exabyte Sponsor Showcase Presentation
What’s Next in Vulnerability Management?
Enterprises have long struggled with getting their traditional endpoint solutions to interface well with each other. Vulnerabilities continue to increase in number and severity, leaving security and IT teams with unidentified devices, misclassified assets, an overabundance of alerts and overlooked system patches. Though an important global resource for organizations, the Internet also exposes company networks to cybercriminals who attempt to crack networks, steal proprietary information, plant malware onto computers and more. Even new computers get tested by attackers within minutes of connecting to the Internet and, if left unsecured, fall victim to attacks within 24 hours. To obtain cohesion with our enterprise solutions and protect our most crucial assets, future Vulnerability Management processes must provide true, risk-based prioritization of threats and unify the entire vulnerability workflow—from discovery to remediation. Join our conversation as we discuss the need for prioritization and how to speed response and remediation for the most critical vulnerabilities.
3:10 PM CT: Information Security Executive® Deep Dive Panel
An industry cross section of ISE® Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Chief of Cyber Security Operations Center
Deputy Chief Information Security Officer
3:30 PM CT: ISE® Central Nominee Showcase Presentation #2
This is The Way: Inspirational Leadership in Security Teams
CSO & CIO
ISE® Central People's Choice Award Winner 2019
ISE® North America People's Choice Award Winner 2019
ISE® Central People's Choice Award Winner 2020
ISE® Central Executive Award Finalist 2020
ISE® North America Executive: Commercial Award Finalist 2020
“This is The Way” is the creed of the Mandalorians in Star Wars about remaining true to your core values and rising above great challenges to succeed. You can utilize this forward-thinking perspective in your own security team leadership. Leading your teams with a vision, with clear communication, and with responsibility, accountability, and trust are key elements to succeed in championing success in your group. Join us as Amanda Fennell discusses Relativity’s SOAR initiative to ensure each member of the team is functioning to the best of their ability, enjoying what they’re doing, and are able to have their voices heard to keep the team moving forward efficiently as a cohesive unit.
3:45 PM CT: ISE® Central Digital Awards Show
Honoring and celebrating the ISE® Central Award Nominees, this exciting digital event will recognize the individuals and the project teams who have made significant and positive impacts on their organizations through exemplary performance.
4:05 PM CT: ISE® Digital Lounge (Continued Networking & Sponsor Visits)
Executives may continue checking in with sponsors to receive a “stamp” for their virtual ISE® Digital Passport.