ISE® VIP Programs During RSAC 2020


Once again, T.E.N. via the ISE® VIP Programs will proudly be during the RSA® Conference 2020 with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference 2020.

ISE® VIP Programs include signature luncheons and exclusive VIP receptions in evenings. As our ISE® VIP Programs have been oversubscribed in previous years due to limited availability, we recommend that you register for these programs early.

Register for all ISE® VIP Programs at RSA® 2019

ISE® VIP Welcome Reception with Ionic Security

ionic security


5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
Register

Say Goodbye to Gridlock: The Shift of Modern Data Protection
All too often, enterprise data security is siloed, but sensitive data is not. Data travels between and resides in applications, data stores, devices and different environments. Every point of access has a context, driven by identity, attributes and complex access policies, which can quickly overwhelm enterprises using disparate solutions and relying on siloes. What results is data security gridlock, which undermines the performance of your business and security team since they cannot scale data protection with the enterprise. For decades, security has focused on securing the gates, moats and fences around where data resides, but that is no longer an effective procedure. Now that location is no longer definitive, we need to go back to the basics and ask a simple question: Why don’t we just start with eliminating gridlock and protecting the data? Join our conversation as we discuss how to seamlessly enable scalable, sustainable and consistent data protection by securing sensitive data from unauthorized access and breaches, wherever it lives or travels.

Ionic Security Executive Speaker:

Adam Ghetti

Adam Ghetti
Founder & Chief Technology Officer
Ionic Security

ISE® VIP Hosts:

Selim Aissi
SVP & CISO
Ellie Mae
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

ISE® VIP Private Dinner with Cisco

cisco


6:30 pm – 9:30 pm
Mastro’s Steakhouse
399 Geary St.
San Francisco, CA 94102
Register

Cleaning Out Your Security Closet
Security professionals go hand-in-hand with processes and technology. As security threats evolve and escalate, we tend to accumulate more and more tools and methods until our security stacks become cluttered and too complicated. If Marie Kondo were helping you tidy up, what would you remove from your security portfolio? We all have technologies and processes we cling to, not because we necessarily need them but because they are comfortable and familiar. If we take a step back and look at the bigger picture, we can determine the security solutions and processes we can live without while pinpointing what gaps we still need to fill. Join our conversation as we discuss a Marie Kondo approach to trimming down and cleaning up your security closet while also asking ourselves the inevitable question: does anything really spark joy in cybersecurity?

Cisco Executive Speaker and Co-Host:

Nather_Wendy Wendy Nather
Head, Advisory CISOs for Duo Security
Cisco
Biography

Welcoming and Closing Remarks:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Co-Host:

Kevin McKenzie

Dr. Kevin McKenzie
VP & CISO
Dollar Tree Stores
ISE® Southeast Executive Award Winner 2013
ISE® North America Academic Executive Award Winner 2013

Biography

ISE® VIP Signature Luncheon with Cisco Umbrella

cisco


12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register

Simplified Security Starts in the Cloud
The average company uses more than 75 security tools. Firewalls. Web proxies. SIEM. Appliances. Third-party intelligence. The list goes on… What do these tools have in common? They lead to silos and a sea of security alerts for overwhelmed staff who struggle to make sense of it all. With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users a growing target for attacks, it’s likely that your existing security stack is coming up short—and you’re not alone. There is a better way to secure cloud applications and internet access for on-the-go users. Join our conversation as we discuss the resulting security challenges and why many organizations are shifting security services to the cloud to reduce complexity, deliver greater flexibility and enact more consistent enforcement.

Cisco Executive Speaker:

Brian Roddy
Vice President of Cloud Security
Cisco
Biography

Moderator:

Meghan Diaz
Head of Cloud Security Marketing
Cisco

Welcoming and Closing Remarks:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

ISE® VIP Panelists:

Bambawale_Sujeet

Sujeet Bambawale
CISO
7- Eleven

Alex Ciurczak
SVP/CISO
EPIC Insurance Brokers & Consultants

David Batz

Harvey Deak
Head of Security Strategy and Architecture
National Australia Bank Limited
Biography

Erik Peterson
CISO
Crane Co.
Biography

ISE® VIP Reception with LookingGlass

LookingGlass

7:00 pm - 10:00 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
Register

Obtaining 20/20 Vision: Look Deeper and Act Faster With Smarter Intelligence-Driven Risk Management
When your business is at risk, every second matters. The time your security teams spends researching and mitigating known threats is just as important as the time they lose at being unaware of hidden vulnerabilities. In order to obtain 20/20 vision of threats to your business, you will need to enlist an intelligence-driven risk management strategy that is seamless, comprehensive and fully integrated with your security and business needs. Keeping threats at bay on a global scale means meeting them on that scale with global attack surface monitoring, threat modeling, network defense and tailored intelligence-as-a-service. Each security partnership you forge should contribute actively to the defense of your enterprise network and beyond. The right threat intelligence partner will equip your security team with asset visibility and network traffic analysis along with the behavior and signature-based detection required to confidently protect your business. Join us to discuss the need for proactive global threat intelligence; the usefulness of advanced mitigation techniques such as deception and redirection; and how making the right security partnerships can enable us all to see more and act faster.

ISE® VIP Hosts:

David Batz

David Batz
Senior Director, Cyber & Infrastructure Security
Edison Electric Institute
Biography

Dave Martin
Vice President of Threat and Incident Management
ADP
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Shelbi Rombout

Shelbi Rombout
Deputy Chief Information Security Officer
U.S. Bank

Gene Scriven

Gene Scriven
Chief Information Security Officer
ACI Worldwide
ISE® Southeast People’s Choice Award Winner 2008
ISE® Southeast Executive Award Finalist 2008

Biography
T.E.N. Success Story

ISE® VIP Signature Luncheon with Respond Software

respond software

11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register

It’s the End of the SOC as We Know It (And I Feel Fine)
Digital transformation is changing every part of the business, but when it comes to the security operations center (SOC), things haven’t changed much over the past ten years. Enterprises have many disparate security tools in place, and humans are sitting in the SOC, looking at mountains of data and trying to make a decision: Is this alert something to pay attention to, or is it just noise? The constant, overwhelming exposure to security alerts quickly adds up, in time, money and fatigue, leading to analyst burnout and high turnover with few conclusive security results to show for it. Whether your SOC is comprised of your own employees or handled by a service provider, you’ll want to ensure SOC members are happy, performing rewarding and impactful work, rather than getting lost in the trenches where machines and automation can flourish instead. To make a difference, you may have to get rid of filters, prioritize your people and reinvent your data management strategy in ways you never considered doing before. Join our conversation as we discuss how you can modernize your SOC, take advantage of new technology and change the way your SecOps team works.

Respond Software Executive Speaker and Moderator:

Triolo_Chris

Chris Triolo
Vice President, Customer Success
Respond Software
Biography

Welcoming and Closing Remarks:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

ISE® VIP Panelists:

Eric Adams
Chief Information Security Officer
Kyriba
Biography

Renee Guttmann

Renee Guttmann
CISO
Campbell Soup Company
Biography

Hegde_Ramachandra

Ramachandra Hegde
SVP, Chief Information Security Officer
Genpact

Jim Routh

Jim Routh
CISO
MassMutual
ISE® Northeast Executive Award Winner 2007
ISE® North America Executive Award Winner 2014 - Health Care Category
ISE® Northeast Executive Award Finalist 2014
ISE® Luminary Leadership Award Winner 2016

Biography

Tony Spurlin

Tony Spurlin
Vice President & Chief Security Officer
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

ISE® VIP Reception with Digital Guardian

digital guardian

6:30 pm - 9:30 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
Register

Make the Leap to Cloud-Delivered Data Protection (DLP + EDR)
Thanks to the emphasis on data privacy, we are witnessing a resurgence of Data Loss Prevention (DLP) within organizations. A Gartner study predicts that 85% of organizations will have implemented DLP by 2020, up from 50% in 2017. However, traditional DLP solutions are often limited to guarding against insider threats, forcing enterprises to enlist additional tools to defend against the variety of threats challenging security teams. As a result, security stacks become more complicated, signaling that it’s time to make the leap and allow your DLP strategy to advance with the rest of your security. Since cloud-based security continues to increase in demand, DLP also needs to be cloud-delivered and bolstered by Endpoint Detection and Response (EDR). Cyber attackers are smart; we need to be smarter. Join our conversation as we discuss how you and your security team can reinvent DLP with the cloud and EDR, simplify your security program and mitigate risks to your sensitive data.

Digital Guardian Executive Speaker:

Rosen_Mordecai

Mo Rosen
CEO
Digital Guardian
Biography

ISE® VIP Hosts:

Elliott Franklin

Elliott Franklin
Director of IT Governance & Security
Loews Hotels

Craig  Froelich

Joey Johnson
CISO
Premise Health
ISE® Southeast Executive of the Year Award Winner 2017
ISE® North America Executive: Health Care Award Finalist 2017

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kevin Morrison

Kevin Morrison
Director of Information Security (CISO) and Architecture
Coinstar
ISE® Southeast People’s Choice Award Winner 2015
Biography

William Scandrett
VP, CISO
Allina Health
Biography

ISE® VIP Signature Luncheon with Secureworks

secureworks


11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
Register

Enabling Modern Security Operations to Scale Using the Power of Data Science and the Cloud
Modern security operations require a more agile, scalable, and effective model to address the challenges CISOs face with cloud and software-defined IT landscapes and escalating threats. This evolved approach demands a leap forward in capabilities powered by the speed and scale of machine learning, deep learning, and cloud computing. Join our conversation as we discuss how to put the power of data science and the cloud to work by analyzing vendor-inclusive data from the extended IT ecosystem. The insights gained will enable greater visibility, more reliable decision-making, and smarter automation.

Secureworks Executive Speaker and Moderator:

Steve Hardy

Steve Hardy
Chief Marketing Officer
Secureworks

Welcoming and Closing Remarks:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

ISE® VIP Panelists:

John Schramm

John Schramm
Global Head of IT Risk and Security
MunichRE
ISE® North America Executive Award Finalist 2014 - Financial Category
Biography