ISE® Fireside Webinars

T.E.N. has pivoted to host digital events, so we can stay connected with our colleagues and peers in the cybersecurity industry. During this period of social distancing, we have unveiled a new digital event series to overwhelmingly positive feedback from panelists and attendees alike—the ISE® Fireside Webinars. Our webinar series allows us to achieve our aim of fostering connections between professionals and providers in information technology, so we can collaborate and grow together.

Our ISE® Fireside Webinars highlight top-of-mind industry topics, so we can all benefit from the latest advice, share valuable information and continue learning with one another. Though we are all shifting to work remotely, we can still be innovative in the way we share information and keep in touch within a digital culture.

Attendees of the ISE® Fireside Webinars will receive 1 CPE upon its conclusion.

ISE® SALES AND MARKETING FIRESIDE WEBINAR: Turning Digital Outreach Into Real Relationships: Sales and Marketing Techniques Amidst Pandemic Fatigue

Original Air Date: August 13, 2020
Duration: 45 minutes
View this webinar Video On Demand

Sales and marketing teams are facing extraordinary challenges in connecting with cybersecurity professionals and engaging with them in a significant capacity. In fact, most professionals are fatigued due to the pandemic and working from home in general, becoming desensitized from the influx of emails both are causing. What was once a reliable method of communication between vendors and security professionals is now dreaded, and without office phones to call, vendors are unable to determine the best time to contact potential customers and how. Cellphones are not always acceptable, and security members are having to divide their time even more between professional and personal obligations. Even digital events have become too numerous, and both vendors and security members must carefully vet which ones will provide true value to participate in. How, then, can vendors engage in effective digital outreach with customers that will transform into real, enriching business relationships for them both? Join our conversation as we discuss with security leaders what sales and marketing techniques will be crucial for vendors to employ now, so security teams can make the best investment decisions and prepare for the coming months.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Dave Estlick, CISO, Chipotle Mexican Grill
Joey Johnson, CISO, Premise Health
Dr. Kevin McKenzie, VP & CISO, Dollar Tree Stores
Jim Routh, CISO, MassMutual

ISE® FIRESIDE WEBINAR: The Role of the CISO in Compliance: The Good, the Bad, and the Ugly

Original Air Date: August 12, 2020
Duration: 45 minutes
View this webinar Video On Demand

No matter the type of audit or regulation, there is always a cybersecurity component that accompanies it. In fact, CISOs often find themselves involved in the process, as auditors tend to ask for the same kinds of security information regardless if the business follows PCI, HIPAA, or another type of compliance. Whether it’s information about firewalls, perimeters or other security measures, CISOs and other security executives face constant churn with gathering and delivering that information for each separate audit—to the point where it has become a full-time job by itself. While automation seems to be an obvious answer to the problem, there are not many tools built specifically for handling compliance. Instead, security professionals often turn back to employing spreadsheets, since automation tools require constant care and feeding, resulting in a cumbersome experience. The tension of handling compliance only grows when you consider how privacy has surged to the forefront of concerns, along with IT and security. Join our conversation as we discuss how security executives are managing compliance now and what new strategies they are considering for how to conduct it more effectively in the future.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Chris Leach, Senior CISO Advisor, Cisco
Marc Varner, Corporate VP and Global CISO, Yum! Brands

ISE® FIRESIDE WEBINAR: Secure Collaboration Begins with Secure Email

Original Air Date: July 29, 2020
Duration: 45 minutes
View this webinar Video On Demand

Existing secure email solutions have been relegated to a compliance-only role, seldom used to protect proprietary information, and never used to initiate a collaboration with a partner, supplier, or other outside party. The culprits are principally a poor user experience, especially for recipients; no ability to provide controls over attachments; and no content collaboration features of any kind. Fortunately, new approaches to secure mail address these limitations, incorporating file sharing and collaboration features that leverage your existing cloud file storage and sharing solutions, such as OneDrive, SharePoint and Box. Join our conversation as we discuss how the role of secure email can be extended to cover external file sharing and content collaboration use cases—with an ease-of-use that both senders and recipients will welcome.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Chuck Deaton, Deputy Chief Information Officer, Humana
Nick Stamos, CEO & Founder, e-Share
Patrick Sullivan, Head of Security Operations, Refinitiv

ISE® FIRESIDE WEBINAR: Head in the Clouds: Don’t Forget About Cybersecurity

Original Air Date: July 23, 2020
Duration: 45 minutes
View this webinar Video On Demand

Many enterprises had already transitioned their data centers into the cloud and other heavily virtualized environments before the pandemic. However, the sudden shift to remote environments has caused more companies and employees than ever to utilize cloud tools and applications in order to manage workflows from home. Since many of these changes happened overnight, it’s inevitable that enterprises overlooked applying proper cybersecurity controls in favor of keeping the lights on. In addition, security teams cannot use on-prem security measures to secure remote, cloud environments, and older practices—such as implementing choke points to force data flows through a select set of avenues—simply don’t work anymore. In this new remote world, how will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss the challenges of maintaining cybersecurity during cloud migration along with best practices for how a comprehensive cloud platform can synchronize your enterprise teams no matter where they work.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Amit Bhardwaj, CISO, Lumentum
Chris Ray, CISO, TriNet
Ed Yousfi, Director, IT Security (CISO), Gallagher Bassett Services

ISE® FIRESIDE WEBINAR: Eliminating Security Blind Spots Across AWS, Azure, and GCP

Original Air Date: July 21, 2020
Duration: 45 minutes
View this webinar Video On Demand

As organizations of all sizes and industries continue transitioning their infrastructure to the cloud, security professionals are challenged to secure and have visibility into public cloud services like AWS, Azure, and GCP. Gaps in breadth and depth of coverage impose new risks from vulnerabilities, malware, misconfigurations, lateral movement, secret keys, weak and leaked passwords, and unsecured PII. These obstacles make their jobs difficult if not impossible. Thankfully, an outcropping of tools offers visibility and security into cloud behavior but implementing those tools correctly to gain those results is only step one. Security professionals must also use this newfound knowledge while adhering to the reasons the company shifted to the cloud in the first place: to move fast and grow. Join our conversation as we discuss how enterprises can regain workload-level visibility into cloud assets as well as convert this information to actionable security that maintains innovation and performance.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Robert Allen, Global Chief Information Security Officer, Gallagher
Al Ghous, Vice President, Chief Security Officer, ServiceMax
Avi Shua, CEO, Orca Security

ISE® FIRESIDE WEBINAR: Get off the Treadmill: Simplify Your Security Infrastructure to Reach Operational Efficiency

Original Air Date: July 15, 2020
Duration: 45 minutes
View this webinar Video On Demand

Security leaders and their teams are expected to keep pace with more cyber threats than ever before. By pivoting to remote environments overnight, enterprises have encountered new security vulnerabilities and shortcomings that have required immediate mitigation. At the same time, business leaders expect for the lights to stay on, meaning security teams must perform their tasks without negatively impacting operations. Some have turned to adopting a growing list of tools to maintain operational efficiency and make up for talent shortfalls, putting them on an endless treadmill of stitching up incompatible products. Is this truly the right strategy for reducing costs and identifying risks quickly? Security operations might be better served by avoiding further vendor overload to instead have teams optimally utilize the resources they already possess. For instance, if your current security platform cannot display your mean time resolution of threats in minutes instead of hours, there may be something you can do differently to acquire greater operational efficiency. Join our conversation as we discuss how enterprises can simplify their security for a consistent experience that unifies visibility; enables automation; and strengthens your security across networks, endpoints, the cloud and applications.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Chris Leach, Senior CISO Advisor, Cisco
Richard Rushing, Chief Information Security Officer, Motorola Mobility

ISE® FIRESIDE WEBINAR: Security 2.0: Planning for 2020 and Beyond in a Remote Workforce World

Original Air Date: June 30, 2020
Duration: 45 minutes
View this webinar Video On Demand

The rulebook changed quite literally in March 2020 when companies across the US went 100% remote. This has reshaped and reset priorities for security, not just for the remainder of 2020 but also permanently. Digital initiatives that started off with 3-year roadmaps have become near to mid-term priorities for organizations as they build plans for an ever-increasing number of remote employees. While these expedited steps have been necessary, they also combine to create ideal conditions for insider threats, making it essential for organizations to revisit overall security strategies. What new challenges will security leaders face, and how are security leaders planning to tackle them? Join our conversation as we discuss the future of security that manages both in-office and remote work environments as well as the evolving role of security teams to include infrastructure planning, supporting higher percentages of digital employee onboarding and offboarding, incident response planning for insider threats, employee training and more.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Frank Aiello, VP, CISO, Maximus
Cindy Cullen, Global Director Information Security, Interpublic Group
Jadee Hanson, CISO, Code42

ISE® FIRESIDE WEBINAR: Minding the Gap: What Is Missing From Our Security Technology Stack?

Original Air Date: June 24, 2020
Duration: 45 minutes
View this webinar Video On Demand

According to the World Economic Forum, business leaders regard cyberattacks as the top risk behind fiscal crises in advanced economics, making it imperative for CISOs and their teams to identify areas where greater protection is needed. Even before the pandemic, security and business leaders have experienced friction and shortcomings from their security technology stack, lacking capabilities in areas like automation, data management, incident response and others. Some struggle with overcomplicated stacks, where tools do not integrate well with each other and obscure visibility into vulnerabilities, while others have technology that simply does not cover all their security needs. With the nation-wide pivot towards remote work, security teams have discovered new vulnerabilities that either went unnoticed or unencountered before. Previously under-defended devices, work-from-home employees and niche areas like telehealth now comprise much bigger considerations as we search for gaps in our security stack. Join our conversation as we discuss best practices for identifying security vulnerabilities caused by your own technology and determining which tools and processes are needed for the future.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Chris Leach, Senior CISO Advisor, Cisco
Anahi Santiago, Chief Information Security Officer, Christiana Care Corporation

ISE® FIRESIDE WEBINAR: Modern Authentication in a Post-COVID World

Original Air Date: May 27, 2020
Duration: 45 minutes
View this webinar Video On Demand

The rapid shift to remote work brought about by COVID-19 has made it clear that identity is the new perimeter. While many companies had been moving to cloud before the outbreak, those that hadn't found themselves unable to support their now-distributed workforces. The pandemic has served as a clarion call for companies to adopt infrastructure that enables people to work anywhere, anytime. In order to do that, companies need strong authentication to know exactly who is coming through their perimeter, a fine-grained, risk-based way to regulate what they're able to access, and in-depth reporting for compliance, audit, and security operations needs. Meanwhile, companies need to achieve all this in a way that doesn't introduce user friction or insecurity, two common complaints arising from the use of passwords. What if there were a better way? A way that enabled passwordless authentication to support strong security, reduce user friction, and enable distributed employees? Join our conversation as we discuss a modern, cloud-first approach to identity management that enables continuous, risk-based authentication and authorization as well as achieves a Zero Trust security posture, all while answering, “How do we get there?”

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Stacy Hughes, Chief Information Security Officer, Global Payments, Inc.
Thomas (TJ) Jermoluk, Chief Executive Officer & Co-Founder, Beyond Identity
John Masserini, Global CISO, Millicom International Cellular

ISE® FIRESIDE WEBINAR: IT Security? Check! But What About Your OT Security?

Original Air Date: May 14, 2020
Duration: 45 minutes
View this webinar Video On Demand

The digital transformation of industrial systems yields numerous benefits and efficiencies for business, but the resulting interconnectivity between these systems and an organization’s IT network has made operational technology (OT) increasingly susceptible to cyber threats. While the role of CISOs in dealing with IT network security is well defined, many security leaders do not possess clear methods about how they can defend OT systems effectively. In fact, IT and OT teams are often kept separate without clear lines of communication about the other’s security processes. Further complicating matters, traditional IT security tools are not compatible with OT environments, and conventional wisdom for defending IT environments is not always applicable. The world literally runs on Industrial Control Systems, and they are attractive targets for state actors and other cybercriminals to attack, making them imperative to keep safe. Join our conversation as we discuss best practices to develop comprehensive OT security for converged IT/OT environments with strategies that identify, detect, protect against and respond to the latest cyberattacks.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Galina Antova, Co-Founder, Claroty
Dawn Cappelli, VP, Global Security and CISO, Rockwell Automation
Curley Henry, Executive Director, Cybersecurity Strategy and Architecture, Southern Company

ISE® FIRESIDE WEBINAR: You Just Saved the Company—Again—But Does the C-Suite Understand How?

Original Air Date: May 12, 2020
Duration: 45 minutes
View this webinar Video On Demand

Most security teams struggle to communicate with business executives in a strategic manner. Business executives likewise struggle to translate security metrics into business indicators they can work with. Cybersecurity executives are tasked with helping the C-suite and board understand complicated issues, such as how much enterprise security posture changed in the past year as well as the impact their latest investments yielded for endpoint security defense. For that, they need to use the right language and metrics. Today, more executives are learning that control maturity scores are an insufficient measure of defense. They’d like to understand how secure the organization is in the face of all cyber threats that are active in the wild at any given time. While security teams have great insight, there is a gap between reporting baseline measures of the organization’s security posture to executives, mapping the security posture to specific threats of immediate concern and presenting data-driven metrics to support actionable mitigations that will assure the board that the organization is well protected. Join our conversation as we discuss effective methods for security teams to collect actionable metrics about their enterprise security posture; how to determine organization-wide preparedness for specific types of threats and strategies for improvement; and ways to communicate these insights to the board and cross-functional teams effectively.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Guy Bejerano, CEO & Co-Founder, SafeBreach
Yaron Levi, Chief Information Security Officer, Blue Cross Blue Shield of Kansas City
Jed Young, CISO, Jabil

ISE® FIRESIDE WEBINAR: The Future of Vulnerability Management

Original Air Date: May 7, 2020
Duration: 45 minutes
View this webinar Video On Demand

Enterprises have long struggled with maintaining complete visibility into their entire hybrid environment and making sure all systems stay properly updated and patched. Despite the investment in security teams, processes and technology, vulnerabilities and system misconfigurations remain the most common source of cybersecurity breaches. Meanwhile, vulnerabilities continue to increase in number and severity, leaving security and IT teams with unidentified devices, misclassified assets, an overabundance of alerts and overlooked system patches. For many organizations, today’s vulnerability management programs involve multiple teams and disjointed solutions, making it difficult for organizations to identify and remediate the most serious threats. Join our conversation as we discuss the need for prioritization and how to speed response and remediation for the most critical vulnerabilities.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Bobby Dominguez, SVP, Chief Information Security Officer, City National Bank
Jimmy Graham, Senior Director, Product Management, Qualys
Gene Scriven, Chief Information Security Officer, ACI Worldwide

ISE® FIRESIDE WEBINAR: Cyber Attackers Have an Inherent Advantage: How Do We Change That?

Original Air Date: April 30, 2020
Duration: 45 minutes
View this webinar Video On Demand

In today’s asymmetrical warfare between cybercriminals and organizations, the cards are stacked against the good guys. While attackers only have to find one weak spot, security teams have to monitor and protect everything at all times, which in many instances dictates only one, virtually predestined outcome of the battle. With every marquee name that is breached, it is clear that crippling cyberattacks have become the new normal. Although this “era of insecurity” began more than 10 years ago, it has become more and more extreme in recent years, and there are three main factors that exacerbate the current situation. The first is that cybercrime is lucrative, and offensive scanning and exploitation tools have become cheaper, more automated and widely available to attackers. Second, in the hyperconnected IT ecosystem of today’s organizations, it is exponentially more difficult to continuously monitor and debug everything in a timely fashion. Finally, we are losing sight of security risks. Without a complete view of an organization’s entire attacker-exposed IT ecosystem—including risk from cloud, third-party and subsidiary environments—and an understanding of the business context of its assets, an organization cannot appropriately assess, prioritize and eliminate its most critical risks. Join our conversation as we discuss cybersecurity strategies that will turn the tables on our adversaries as well as regain visibility into our organization’s IT ecosystem, allowing us to locate and mitigate our most dangerous risks before they can be exploited.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Rob N. Gurzeev, CEO & Co-Founder, CyCognito
Joey Johnson, CISO, Premise Health
Laura Whitt-Winyard, Global Chief Information Security Officer, DLL

ISE® FIRESIDE WEBINAR: Mitigating Device Security Risks in Data Centers, Remote Use and Supply Chains

Original Air Date: April 28, 2020
Duration: 45 minutes
View this webinar Video On Demand

Firmware is often an enterprise’s unguarded attack surface. Laptops, mobile phones, servers, networking equipment and other devices contain many different components, and each one hosts millions of lines of code developed by various manufacturers that run independently of the operating system. Many organizations lack visibility into their firmware and hardware attack surface, leaving the enterprise at risk of device failures, ransomware and data breaches. A 2019 Gartner study estimates that 70% of organizations without a firmware upgrade plan in place will experience a breach due to a firmware vulnerability by 2022. Our collective shift to remote work has also introduced new vulnerabilities to our devices and environments that we did not anticipate. Join our conversation as we discuss best practices for CISOs and their security teams to mitigate security risks targeting the device integrity of data center environments, remote users and supply chains.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Yuriy Bulygin, Founder & CEO, Eclypsium
Mario Chiock, Schlumberger Fellow & Executive Cyber Security Adviser, Schlumberger International Inc
Robert Mims, Director, Security - Gas, Nuclear, Generation and Transmission Operations, The Southern Company

ISE® FIRESIDE WEBINAR: You Survived Transitioning to a Remote Workforce: Now How Do You Secure It?

Original Air Date: April 2, 2020
Duration: 45 minutes
View this webinar Video On Demand

The rush to move employees to work remotely is creating huge opportunities for cyber criminals. Rapid changes to network configurations; unexpected utilization of unsecure networks and unsanctioned SaaS services; and inexperienced work-from-home users have expanded the attack surface too quickly for security teams to respond. In addition, travel restrictions and shelter-in-place rules are hampering IT and security team’s abilities to accomplish important security tasks, including planned penetration testing, red team exercises and testing security controls. Join our conversation as we review the challenges that must be addressed immediately, such as how remote security testing is a key tool to implement right now, as well as how prioritizing remediation based on the importance of digital assets at risk is critical during periods of rapid digital transformation.

Moderator: Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent

Panelists:
Gus Evangelakos, Director of North American Field Engineering for XM Cyber
Ricardo Lafosse, Chief Information Security Officer for The Kraft Heinz
Tony Spurlin, Vice President & Chief Security Officer for Windstream

ISE® FIRESIDE WEBINAR: Next Generation Cybersecurity: The Call for Collective Defense

Original Air Date: March 31, 2020
Duration: 45 minutes
View this webinar Video On Demand

As cyber criminals, nation-states and other threat actors unite in collective offense against vulnerable enterprises, the call for collective defense among security professionals across the public and private sectors grows louder. Despite many cybersecurity professionals claiming confidence in their enterprise cyber defense technologies and systems—and continuing to invest in additional solutions—malicious attacks are still getting through. These attacks are avoiding detection, slipping past defenses and compromising network security, well before anyone realizes it has happened. Nation-state actors are joining together to dedicate economic and human resources to cyberattacks at a scale and speed that demand an equally coordinated defense. At a time when data breaches are impacting company reputations, job security and even national security, cyber defense is now a crucial issue for investors and corporate boards. So how can companies, industries and governments work together in real time to defend proactively at the same scale and speed as the coordinated attacks heading their way? Join our webinar as we discuss how collaborating on defense can shift an organization's threat detection strategy towards a more proactive posture and bolster its position against cyber criminals and state-actors as well as how security executives can get the C-suite and board in support of a collective defense approach.

Moderator: Marci McCarthy, CEO and President of T.E.N., CEO and Chairman of ISE® Talent

ISE® VIP Panelists:
Michael Ehrlich, CTO for IronNet Cybersecurity
Ray Griffin, Director, Head of Cyber Security for Cox Media Group
Dave Summitt, Chief Information Security Officer for H. Lee Moffitt Cancer Center & Research Institute

CONTACT T.E.N. TODAY

Interested in sponsoring an ISE® Fireside Webinar? Contact sales at sales@ten-inc.com or (404) 920-8582, ext 106