Upcoming Events

ISE® PRIVATE DINNER
How Do You Keep Your Security Nerds Happy?

October 17, 2018
5:30pm - 8:30pm
Pappas Bros. Steakhouse
10477 Lombardy Ln.
Dallas, TX 75220
Registration
Hammond_Sonja

Sonja Hammond
Chief Information Security Officer & Privacy Officer
Essilor of America, Inc.
Biography

One of the biggest line items on any security budget is people. While finding them is hard, keeping them can be even harder. What motivates security pros and entry-level analysts? How do you keep them from getting frustrated to the point of leaving? How can you recruit people that match the mission and culture in your security organization? Making sure your analysts have the tools they need and the ability to collaborate and learn from one another can go a long way towards keeping them happy. But that’s often easier said than done.

Join us for an evening of conversation as we discuss best practices for getting, growing and graduating security talent in your organization.

ISSA International Conference 2018
The Future of the CISO: Championing Security, Driving Business and Promoting Diversity

October 18, 2018
9:40 am - 11:10 am
Georgia World Congress Center
285 Andrew Young International Blvd NW
Atlanta, GA 30313
More Information
Registration

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Tamika Bass

Tamika Bass
CISO
Georgia Department of Public Health

Todd Fitzgerald

Mary Ann Davidson
CSO
Oracle Corporation
Biography

name

Michelle Stewart
Chief Information Security Officer
RentPath
Biography

Vladimir Svidesskis
Information Security Director
Georgia Lottery Corporation

The role of the Chief Information Security Officer has evolved significantly over the last decade. According to the 2017 State of Cyber Security study, the percentage of organizations with a CISO increased from 50% to 65% between 2016 and 2017. The need for highly skilled and dedicated information security leaders has become a crucial necessity. Despite this, minority representation in cybersecurity continues to lag behind at 26%, with only 23% of that amount holding a role of director or above, according to (ISC)²’s 2018 report, “Innovation Through Inclusion: The Multicultural Cybersecurity Workforce.” As the roles and functions expected of a CISO continue to change to encompass not only championing security but also driving and enabling business, does that also leave room for promoting diversity in leadership roles throughout the tech industry? Join our panel as we look at the evolving role of the CISO and discuss what the future of security, business and diversity holds for this increasingly critical role.

ISE® PRIVATE DINNER
Security 2025: What Does the Future of Security Look Like?

October 18, 2018
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
2525 West End Ave.
Nashville, TN 37203
Registration

Netskope Executive Speakers:

Sean Cordero
VP of Cloud Strategy
Netskope

Vladimir Klasnja
Director, Cloud Architecture Services
Netskope

ISE® VIP Host:

Terrie Jennings

Terrie Jennings
Information Security Officer
Willis Towers Watson & Co.
Biography

For the last 20 years we have reactively implemented monolithic security solutions by stacking legacy products on top of each other. This non-integrated approach has forced our organizations to confront significant complexity, resource drag and lack of effectiveness. As a community, it’s time to unite and define the new North Star of where security is headed. How do we challenge ourselves to a new way of thinking? What do we want our organizations to look like? How do we shift ourselves into a position where we can capably manage fast-paced challenges? Security 2025 is a research project focused on building a new and sustainable security blueprint. By coming together as security leaders, we can use our real-world experiences and knowledge to redesign and rebuild the engine of security. Join us for an evening of conversation as we discuss our unified approach in creating a cohesive and effective operating model that the industry can utilize for years to come.

Secureworks Access18 Conference
Panel: Building a Successful Security Team

October 22, 2018
3:45pm - 4:45pm
Loews Hotel
1065 Peachtree St NE
Atlanta, GA 30309
More Information
Registration

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Linda Marcone

Linda Marcone
CISO
Serta Simmons Bedding
Biography

Terry McGraw

Terry McGraw
Vice President, Global Cyber Threat Research and Analysis
Secureworks
Biography

Kathy Memenza

Kathy Memenza
CISO
Hilton

Loren Morgan

Loren Morgan
CISO
Owens & Minor
Biography

Kevin Morrison

Kevin Morrison
Vice President of IT & CISO
Rollins
Biography

As the threat landscape continuously evolves and security solutions multiply, CISOs face serious challenges in obtaining, growing, and retaining a security team that can keep pace with the organization’s needs. The skills gap especially is a universal issue across organizations of all sizes, so much so that IDC reports that 30 percent of security spending will be on vendors that provide an integrated platform approach to security, including the use of Managed Security Service Providers (MSSPs), by 2020. CISOs can prepare for this shift by thoroughly evaluating an MSSP to ensure it meets their organization’s security requirements. Once CISOs have found the right MSSP, they can integrate it with their current security strategy so it adds value, rather than complexity, to their processes. As for internal security team members, CISOs have a responsibility to utilize and nurture their skills to their fullest potential. If CISOs can provide training initiatives that are relevant to the team’s unique challenges and utilize an MSSP to tackle responsibilities their team doesn’t have time for, they can ultimately improve employee retention and scalability. By utilizing a shared responsibility model that focuses on people, processes, technology, and strategy, CISOs can build security teams so that they are stronger and more prepared for the future than ever before.

ISE® PRIVATE DINNER
Security 2025: What Does the Future of Security Look Like?

October 23, 2018
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Registration

Netskope Executive Speakers:

Sean Cordero
VP of Cloud Strategy
Netskope

Vladimir Klasnja
Director, Cloud Architecture Services
Netskope

ISE® Guest Host:

Dave Estlick

Dave Estlick
CISO
Starbucks Coffee Company

For the last 20 years we have reactively implemented monolithic security solutions by stacking legacy products on top of each other. This non-integrated approach has forced our organizations to confront significant complexity, resource drag and lack of effectiveness. As a community, it’s time to unite and define the new North Star of where security is headed. How do we challenge ourselves to a new way of thinking? What do we want our organizations to look like? How do we shift ourselves into a position where we can capably manage fast-paced challenges? Security 2025 is a research project focused on building a new and sustainable security blueprint. By coming together as security leaders, we can use our real-world experiences and knowledge to redesign and rebuild the engine of security. Join us for an evening of conversation as we discuss our unified approach in creating a cohesive and effective operating model that the industry can utilize for years to come.

ISE® PRIVATE DINNER
Security Perspectives – Technology

October 23, 2018
5:30pm - 8:30pm
5A5 Steak Lounge
244 Jackson St.
San Francisco, CA 94111
Registration
Kornberg_Avram

Avram Kornberg
Security and Technology Executive & Founder
Stratecution Consulting, LLC.
Biography

Many modern enterprises are encumbered with an IT architecture that has evolved organically over time. The realities of competing priorities, limited staffing, and budget constraints often mean that systems and strategies remain in place for far longer than originally intended. This can result in a significant burden of cost and complexity and can compromise a business’s agility. Further complicating the issue is the fact that many security teams are constantly being asked to do more with less. When it comes time to choose between rolling out new business services and updating legacy technology, new services almost always win out. But the long-term impacts of these decisions add up over time. Maintenance creates a tax on IT and security. Join our conversation as we discuss how your security team can approach creating a more modern security architecture while dealing with the challenges of legacy technology.

ISE® PRIVATE DINNER
Protecting IT Ecosystems Within an All Encrypted Internet

October 25, 2018
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Registration
Randy Conner

Randy Conner
Director, Threat Prevention, Detection and Response
NCR Corporation

“HTTPS Everywhere” is changing the way that companies and users engage with websites. HTTPS connections use SSL/TLS technology primarily to secure data and to authenticate servers, which protects communications. An internet that achieves 100-percent encryption is a positive step, but what are the repercussions of having this type of security in an IT ecosystem? Join our conversation as we discuss the pros and cons of having an all-encrypted internet and the fundamental shifts to the way IT professionals and customers will maintain security.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

October 29, 2018
5:30pm - 8:30pm
Black & Blue
3349 Monroe Avenue
Rochester, NY 14618
Registration
Bob Steron

Bob Steron
CISO
Kodak Alaris
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Perspectives – Technology

October 30, 2018
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Registration
Kornberg_Avram

Avram Kornberg
Security and Technology Executive & Founder
Stratecution Consulting, LLC.
Biography

Many modern enterprises are encumbered with an IT architecture that has evolved organically over time. The realities of competing priorities, limited staffing, and budget constraints often mean that systems and strategies remain in place for far longer than originally intended. This can result in a significant burden of cost and complexity and can compromise a business’s agility. Further complicating the issue is the fact that many security teams are constantly being asked to do more with less. When it comes time to choose between rolling out new business services and updating legacy technology, new services almost always win out. But the long-term impacts of these decisions add up over time. Maintenance creates a tax on IT and security. Join our conversation as we discuss how your security team can approach creating a more modern security architecture while dealing with the challenges of legacy technology.

ISE® NORTH AMERICA PRIVATE WELCOME DINNER
Improving Visibility for Effective Threat Detection and Response

November 7, 2018
5:30pm - 8:30pm
Chicago Cut
300 N LaSalle Dr
Chicago, IL 60654
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® North America Leadership Summit and Awards 2018

The ISE® North America Leadership Summit and Awards 2018 will be held November 8-9, 2018 at Summit Centre and Hyatt Regency Chicago, in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

November 13, 2018
5:30pm - 8:30pm
555 East American Steakhouse
555 East Ocean Boulevard
Long Beach, CA 90802
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

November 13, 2018
5:30pm - 8:30pm
The Capital Grille
Tyson’s Corner Center
1861 International Dr.
McLean, VA 22102
Registration

Secureworks Executive Speakers:

Kathy Fithen

Kathy Fithen
Managing Principal Consultant
Secureworks
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Security 2025: What Does the Future of Security Look Like?

November 27, 2018
5:30pm - 8:30pm
The Capital Grille- Dunwoody
94 Perimeter Center West
Dunwoody, GA 30346
Registration

Netskope Executive Speakers:

James Robinson

James Robinson
Deputy CISO
Netskope

Nate Smolenski

Nate Smolenski
Director, Enterprise Strategy
Netskope

For the last 20 years we have reactively implemented monolithic security solutions by stacking legacy products on top of each other. This non-integrated approach has forced our organizations to confront significant complexity, resource drag and lack of effectiveness. As a community, it’s time to unite and define the new North Star of where security is headed. How do we challenge ourselves to a new way of thinking? What do we want our organizations to look like? How do we shift ourselves into a position where we can capably manage fast-paced challenges? Security 2025 is a research project focused on building a new and sustainable security blueprint. By coming together as security leaders, we can use our real-world experiences and knowledge to redesign and rebuild the engine of security. Join us for an evening of conversation as we discuss our unified approach in creating a cohesive and effective operating model that the industry can utilize for years to come.