ISE® Fireside Webinars

ISE® FIRESIDE WEBINAR
Enhancing Business Agility: Amplifying the Power of Your Cloud and Security Program through Deep Observability

December 13, 2023
WATCH VIDEO ON DEMAND
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Bill Abrams

Jim Mandelbaum
Cloud Architect and Field CTO
Gigamon
Biography

Farley_Paul

Paul Farley
CVP, Deputy Chief Information Security Officer
NCR Voyix
Biography

Today’s modern cloud-first organizations are continuing to invest in advancing digital transformation initiatives to heighten business agility, while tackling an ever-more dangerous threat landscape in an uncertain economy. Join us for an engaging conversation on how to increase application performance, exceed expectations to realize the full potential of hybrid and multi-cloud infrastructures while cutting costs, and reducing complexity. Our panelists will also explore how to amplify the power of traditional security and observability tools with actionable network-derived intelligence and insights to eliminate blind spots, maintain visibility into all data-in-motion – including East-West encrypted and container traffic as well as improving fidelity and proactively mitigate compliance risk.

ISE® FIRESIDE WEBINAR
Ransomware Roulette: Overcoming the Most Dangerous Cyberthreat

December 12, 2023
WATCH VIDEO ON DEMAND
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Pace_Robert

Robert Pace
VP, Information Security & CISO
Invitation Homes
ISE® West Executive Award Finalist 2022
ISE® West People's Choice Award Winner 2023
ISE® Central-West Executive Award Finalist 2024

Biography

Shelbi Rombout

Shelbi Rombout
Deputy Chief Information Security Officer
U.S. Bank
Biography

Ransomware is one of the most dangerous threats businesses and consumers face today. Whether you are an individual or a Fortune 500 company, the experience of getting locked out of your system, having your files encrypted, and being subjected to threats and demands for payment can be harrowing. Join us for an insightful discussion where in a ransomware world traditional security software and classic endpoint protections are no longer enough and how we can better educate enterprises in preventing them. Walk away with a set of actionable next steps to build and execute a ransomware detection and response program. We will also lift the veil on how ransomware criminals operate in an effort to garner a better understanding of these attacks and ways to spot and stop them before it is too late.

ISE® FIRESIDE WEBINAR
Delivering Zero Trust with a SASE Platform

December 6, 2023
WATCH VIDEO ON DEMAND
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Jim Fulton

Jim Fulton
VP Product Marketing & Analyst Relations
Forcepoint
Biography

Gabriel Lawrence Gabriel Lawrence
VP of Information Security Cyber Protection
Toyota Motor North America
Biography
Harshal Mehta

Harshal Mehta
VP, Chief Information Security Officer
CWT
ISE® West Executive Award Finalist 2023
Biography

SASE is a journey where capabilities can be selected one capability at a time, delivering better control over how people get to business applications and use sensitive data. When built with Zero Trust principles throughout, it delivers data security everywhere your business goes. The result is a security stack that’s easier to manage and an organization that’s much safer, with increased productivity and a better user experience. Join us for an engaging discussion on how Zero Trust Data Security relies on a philosophy of “never trust, always verify.” We will also explore how to hone in our most important asset: securing your company’s data while aligning with today’s board room focus in lowering your operating costs bringing more value into the enterprise.

ISE® FIRESIDE WEBINAR
Why a Data-first Approach to SASE Matters

October 26, 2023
WATCH VIDEO ON DEMAND
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Bambawale_Sujeet

Sujeet Bambawale
Vice President and Chief Information Security Officer
7- Eleven
Biography

Vince Spina

Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography

Peter Tse

Peter Tse
Information Security Officer
CTBC Bank, New York Branch
Biography

For years, “digital transformation” has been all the rage. Now, people work anywhere with data everywhere. Join us for an engaging conversation on how to increase workforce productivity, even with BYOD, so that your enterprise can be seamless, faster, competitive – and secure! We will also explore how and where to cut costs, improve the economies-of-scale and reduce risk by replacing fragmented and outdated infrastructures. Our discussions will also reveal how a Zero Trust approach to security can stop threats and continuously protect sensitive data in cloud, web, private apps.

ISE® FIRESIDE WEBINAR
Is ChatGPT (and other AIs) the New Shadow IT?: Enable the AI/ChatGPT World Without the Risk


September 26, 2023
WATCH ON DEMAND
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Manny Rivelo Manny Rivelo
Chief Executive Officer
Forcepoint
Biography

Mike Towers
Former Chief Digital Trust Officer
Takeda Pharmaceuticals
ISE® Northeast Executive of the Year Award Winner 2015
ISE® North America Executive: Health Care Award Winner 2015
ISE® Northeast Executive Award Winner 2020
ISE® North America Executive: Health Care Award Winner 2020

Biography

In the race to compete leveraging generative artificial intelligence (AI) and tools like ChatGPT, a long-standing problem is reemerging with renewed force – Shadow IT. Join us for an engaging discussion on how you can enable your organization to leverage this revolutionary technology, without the risk. AI tools could potentially expose organizations to various security and privacy risks because employees are turning to them for an array of applications, from drafting sales and marketing emails to analyzing sensitive financial data. During our program, we will explore how enterprises can make ChatGPT and other AIs safe to use to include how to limit access to groups/users authorized to test Ais. We will also share the best practices in how to coach users on how to use the properly the platform while developing data security policies can block sensitive info in queries. For organizations that would like to take their fight against AI-related risks to the next level, we will discuss the available frameworks and the ongoing collaboration with the wider industry and government agencies to develop standards and best practices for the responsible use of generative AI.

ISE® FIRESIDE WEBINAR
Data, Devices and People Are Everywhere: Preventing Sensitive Data Loss Across ALL Egress Channels


August 22, 2023
Watch Video on Demand
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Vince Spina

Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography

Eric S. Green

Eric S. Green
Security Operations
TikTok
Biography

Travis Farral

Travis Farral
VP & CISO
Archaea Energy
Biography

It is hard to ignore that the lines between home and office being blurred and unmanaged devices leaving your company’s infrastructure vulnerable. “Democratization of Data, making data available to everyone all the time across websites, cloud apps, and private apps adds a whole level of challenge to the ‘risk reduction equation’. A simpler approach is warranted as the old portfolio of point products wasn’t built for this type of extended enterprise.

Join us for insightful discussion on how to unlock simplicity to bring forth comprehensive data security cross more channels into one set of policies, one console, one agent. We will also explore how to combine Zero Trust principles with a SASE architecture and advanced security to protect data across any website, cloud application, and web-based private applications to keep your data secure everywhere your people work and anywhere your data resides.

The Evolution – More Intelligence and Insight for More Advanced Protection


August 2, 2023
Watch Video on Demand
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Thomas Dager
Vice President, Chief Information Security Officer
Archer Daniels Midland (ADM)
Biography

Ryan Reynolds

Ryan Reynolds
Senior VP, Head of Cyber Risk Oversight
U.S. Bank
Biography

As the number, type, and sophistication of threats evolve, organizations require more intelligence and insight than traditional endpoint security provides. More threat actors are shifting their aim to weaknesses created by user behavior, poor cybersecurity hygiene, and shadow IT. The dramatic increase in the types of endpoint devices—including smartphones, tablets, wearable devices, and more—has overpowered first-generation endpoint security. The increasing number of potentially vulnerable endpoints can also exhaust security team resources that are relying on traditional cybersecurity defenses. Depending on separate software processes to handle the security and security management of endpoints can result in potential disconnects. And maintaining and updating blacklists of malicious codes requires more and more resources. And these legacy products still leave organizations susceptible to zero-day exploits, data theft threatening to slip through among too many false positives.

Join us for an engaging discussion on how next-generation, automated technologies can examine every process on every device to counter potential attacks have become necessary to better lock down endpoint security while investigating every phase of an attack campaign. We will also explore how behavioral analysis requires a multi-layered defense inclusive of AI and machine learning to protect against fileless and other advanced attacks.

Refine The Wheel – Crafting An Intentional And Goal Oriented Cloud Security Strategy That Tackles The Unknown Threat

Neil Carpenter Neil Carpenter
Principal Technical Evangelist
Orca Security
Biography
Kevin Gowen

Kevin Gowen
Chief Information Security Officer
Synovus Financial Corporation
ISE® East Executive Award Winner 2022
Biography

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Tanweer Surve

Tanweer Surve
CTO Cloud Control Management
Wells Fargo
Biography

For many security teams embarking on a multi-year cloud transformation journey, the expectation is to hit the ground running before the paint is even dry. But the evolving threat landscape can make it difficult to get started. Join our panel of cyber security thought leaders as they outline strategies and hone in on tactics for creating a cloud security plan that will modernize and simplify your security stack. The panel will also explore how emergent AI systems like ChatGPT and GPT4 will introduce new opportunities and risks in your cloud security work.

THE SEQUEL - More on How Collaboration Comes More Phishing Because Cyber Criminals are Upping their Threat Game in a Big Way

April 12, 2023
Watch Video on Demand
John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Goldsworthy_DJ

DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Dr. Yonesy F. Nunez

Dr. Yonesy F. Núñez
Chief Information Security Officer
The Depository Trust & Clearing Corporation (DTCC)
ISE® East Executive Award Winner 2023
Biography

We heard and listened that there is so much more to cover in how collaboration tools like Microsoft Teams, Google Docs and Slack being an integral part of everyday working life in today’s hyperconnected world but they are not designed with security in mind. Join us for an insightful discussion as we deep dive into how phishers can now attack via a variety of methods and techniques into your supply chain with the ultimate intent of getting past your own company’s protections. We will also delve into the range of security gaps and most active cyber threats that are associated with these collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will explore how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also continue how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.

Leading the Charge in Managing Cloud Security Risks as a CISO

March 22, 2023
Watch Video on Demand
Andy Ellis

Andy Ellis
Advisory CISO
Orca Security
Biography

Max Garcia

Max Garcia
CISO, Digital First Banking
NCR Voyix
Biography

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Chris McFarland

Chris McFarland
Vice President, Chief Information Security Officer (CISO)
Abercrombie & Fitch Co.
Biography

The financial climate has shifted, making an intentional cloud security budgeting strategy more important than ever. As the CISO, it’s your responsibility to enable security while keeping your eyes on the big picture. Join us for an engaging discussion as we unpack four budget scenarios your organization may be facing: tightening, business as usual, more funding, or even an unknown budget. We will explore how each situation requires different approaches, allowing you to walk away with clear steps you can take to reach a state of security and preparedness.

With More Collaboration Comes More Phishing: How Cyber Criminals are Upping their Threat Game in a Big Way

February 16, 2023
Watch Video on Demand
John Abel

John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography

Goldsworthy_DJ

DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Dr. Yonesy F. Nunez

Dr. Yonesy F. Núñez
Chief Information Security Officer
The Depository Trust & Clearing Corporation (DTCC)
ISE® East Executive Award Winner 2023
Biography

Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.

CONTACT T.E.N. TODAY

Interested in sponsoring an ISE® Fireside Webinar? Contact sales at sales@ten-inc.com or (404) 920-8582, ext 106