ISE® Fireside Webinars

ISE® FIRESIDE WEBINAR
Data, Devices and People Are Everywhere: Preventing Sensitive Data Loss Across ALL Egress Channels

August 22, 2023
Watch Video on Demand

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Vince Spina

Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography

Eric S. Green

Eric S. Green
Business Operations Protection
TikTok
Biography

Travis Farral

Travis Farral
VP & CISO
Archaea Energy
Biography

It is hard to ignore that the lines between home and office being blurred and unmanaged devices leaving your company’s infrastructure vulnerable. “Democratization of Data, making data available to everyone all the time across websites, cloud apps, and private apps adds a whole level of challenge to the ‘risk reduction equation’. A simpler approach is warranted as the old portfolio of point products wasn’t built for this type of extended enterprise.

Join us for insightful discussion on how to unlock simplicity to bring forth comprehensive data security cross more channels into one set of policies, one console, one agent. We will also explore how to combine Zero Trust principles with a SASE architecture and advanced security to protect data across any website, cloud application, and web-based private applications to keep your data secure everywhere your people work and anywhere your data resides.

The Evolution – More Intelligence and Insight for More Advanced Protection


August 2, 2023
Watch Video on Demand
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Thomas Dager
Vice President, Chief Information Security Officer
Archer Daniels Midland (ADM)
Biography

Ryan Reynolds

Ryan Reynolds
Senior Vice President | Director, Security Incident Management
U.S. Bank
Biography

As the number, type, and sophistication of threats evolve, organizations require more intelligence and insight than traditional endpoint security provides. More threat actors are shifting their aim to weaknesses created by user behavior, poor cybersecurity hygiene, and shadow IT. The dramatic increase in the types of endpoint devices—including smartphones, tablets, wearable devices, and more—has overpowered first-generation endpoint security. The increasing number of potentially vulnerable endpoints can also exhaust security team resources that are relying on traditional cybersecurity defenses. Depending on separate software processes to handle the security and security management of endpoints can result in potential disconnects. And maintaining and updating blacklists of malicious codes requires more and more resources. And these legacy products still leave organizations susceptible to zero-day exploits, data theft threatening to slip through among too many false positives.

Join us for an engaging discussion on how next-generation, automated technologies can examine every process on every device to counter potential attacks have become necessary to better lock down endpoint security while investigating every phase of an attack campaign. We will also explore how behavioral analysis requires a multi-layered defense inclusive of AI and machine learning to protect against fileless and other advanced attacks.

Refine The Wheel – Crafting An Intentional And Goal Oriented Cloud Security Strategy That Tackles The Unknown Threat

Neil Carpenter Neil Carpenter
Principal Technical Evangelist
Orca Security
Biography
Kevin Gowen Kevin Gowen
Chief Information Security Officer
Synovus Financial Corporation
ISE® East Executive Award Winner 2022
Biography
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Tanweer Surve

Tanweer Surve
CTO Cloud Control Management
Wells Fargo
Biography

For many security teams embarking on a multi-year cloud transformation journey, the expectation is to hit the ground running before the paint is even dry. But the evolving threat landscape can make it difficult to get started. Join our panel of cyber security thought leaders as they outline strategies and hone in on tactics for creating a cloud security plan that will modernize and simplify your security stack. The panel will also explore how emergent AI systems like ChatGPT and GPT4 will introduce new opportunities and risks in your cloud security work.

THE SEQUEL - More on How Collaboration Comes More Phishing Because Cyber Criminals are Upping their Threat Game in a Big Way

April 12, 2023
Watch Video on Demand
John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Goldsworthy_DJ

DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Dr. Yonesy F. Nunez

Dr. Yonesy F. Núñez
Chief Information Security Officer
Jack Henry & Associates
ISE® East Executive Award Finalist 2022
ISE® East Executive Award Winner 2023

Biography

We heard and listened that there is so much more to cover in how collaboration tools like Microsoft Teams, Google Docs and Slack being an integral part of everyday working life in today’s hyperconnected world but they are not designed with security in mind. Join us for an insightful discussion as we deep dive into how phishers can now attack via a variety of methods and techniques into your supply chain with the ultimate intent of getting past your own company’s protections. We will also delve into the range of security gaps and most active cyber threats that are associated with these collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will explore how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also continue how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.

Leading the Charge in Managing Cloud Security Risks as a CISO

March 22, 2023
Watch Video on Demand
Andy Ellis

Andy Ellis
Advisory CISO
Orca Security
Biography

Max Garcia

Max Garcia
CISO, Global Banking Division
NCR Corporation
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Chris McFarland

Chris McFarland
Vice President, Chief Information Security Officer (CISO)
Abercrombie & Fitch Co.
Biography

The financial climate has shifted, making an intentional cloud security budgeting strategy more important than ever. As the CISO, it’s your responsibility to enable security while keeping your eyes on the big picture. Join us for an engaging discussion as we unpack four budget scenarios your organization may be facing: tightening, business as usual, more funding, or even an unknown budget. We will explore how each situation requires different approaches, allowing you to walk away with clear steps you can take to reach a state of security and preparedness.

With More Collaboration Comes More Phishing: How Cyber Criminals are Upping their Threat Game in a Big Way

February 16, 2023
Watch Video on Demand
John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Goldsworthy_DJ

DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Dr. Yonesy F. Nunez

Dr. Yonesy F. Núñez
Chief Information Security Officer
Jack Henry & Associates
ISE® East Executive Award Finalist 2022
ISE® East Executive Award Winner 2023

Biography

Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.

CONTACT T.E.N. TODAY

Interested in sponsoring an ISE® Fireside Webinar? Contact sales at sales@ten-inc.com or (404) 920-8582, ext 106