Upcoming Events

Participants of digital programs may be eligible to earn 1 or more CPEs per program attended depending on format. For information on our ISE® Programs and Events as they relate to COVID-19, you may view our statement here.

ISE® PRIVATE DINNER
Preventing Email-Borne Supply Chain Attacks

July 29, 2021
5:30pm - 8:30pm CT
Eddie V’s Prime Seafood
4023 Oak Lawn Avenue
Dallas, TX 75219
Registration
Pace_Robert

Robert Pace
VP, Information Security & CISO
Invitation Homes
Biography

Your supply chain partners represent a significant cyber risk as demonstrated recently by the FireEye and SolarWinds breaches. More attackers are exploiting an organization’s suppliers, partners and vendors in order to launch business email compromise campaigns. These new tactics bypass cloud email defenses, legacy email gateways and email authentication standards. Mitigating breaches from a compromised supply chain requires a new approach to securing your third-party cloud and digital communications. Join our conversation to discuss common supply chain-based attack methods including partner spoofing, Business Email Compromise, new domain campaigns, and malicious URLs; real examples of supply chain phishing attacks; and the advanced, cloud-native email security techniques that proactively block these attacks in progress.

ISE® FIRESIDE WEBINAR
Secure Remote Access for the Long-Term

August 5, 2021
2:00 PM – 2:30 PM ET
11:00 AM – 11:30 AM PT
Registration

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Dawn Cappelli
VP and CISO
Rockwell Automation
Biography

Todd Gurela

Todd Gurela
Chief Technology Officer, Industry Solutions Group
Cisco
Biography

Millions of people have been working from home for the past year to support social distancing guidelines during the pandemic. In industrial control system environments (ICS), companies restricted physical access to only those employees that were essential in running operations, and their safety was of paramount concern. Many of us experienced shortages at grocery stores when COVID outbreaks impacted factory employees, resulting in plant shutdowns. As a result, not only did third-party vendors find themselves needing to connect remotely to plant floors, but so did employees needing to work on those industrial control systems. While many countries have now loosened their restrictions, there are indications that working remotely could be long-term or even permanent for some. Secure remote access to ICS environments has yielded improved productivity and quicker response times. That raises some important questions. Is your Industrial Control System network adequately protected against security threats related to remote access? How can you best enable field employees and third-party vendors to connect remotely to your plant floor? Access management was identified as one of the top threats to manufacturer safety in 2020. This threat remains serious as more breaches are happening via remote access than ever before. Ease of accessibility to your network for your employees and vendors is necessary, but it also opens you up to more risk. Join our conversation to learn about the permanent secure remote access options CISOs and technology leaders have deployed over the past year to ensure access to their network is protected and safe—not only for today, but for the long-term.

Attendees of this ISE® Fireside Webinar are eligible to earn one-half (0.5) CPE credit upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Detect Modern Threats Without a Threat to Your Budget

August 11, 2021
5:30-6:45pm ET
4:30-5:45pm CT

STATES INCLUDED: Connecticut, Kentucky, Maine, Massachusetts, New Hampshire, Rhode Island, Tennessee, Vermont

Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Lou Saviano

Lou Saviano
Vice President, Global Information Technology Services
Skillsoft Corporation
ISE® Northeast People's Choice Award Winner 2015
Biography

Organizations are rapidly shifting their business models and corresponding technology environments to quickly respond to this new digital transformation era and compete with one another. Some of these challenges include data collection, analysis, and decisioning, all while the attack surface continues to grow. With an expanding attack surface, a shortage of security talent, and an overwhelming amount of alerts, security teams need tools and strategies to modernize their SOC. Join our conversation to learn strategies and best practices to help you bring your enterprise SOC to the next level in a simple and cost-effective scale.

Attendees of the ISE® Cocktails and Conversations are eligible to earn 1 CPE upon its conclusion.

InfoSec Nashville 2021
How to Reenergize Team-Building in Cybersecurity Teams

August 13, 2021
2:15-3:15pm CT
Music City Center
201 5th Avenue South
Nashville, TN 37203
Registration
More Information

Moderator/Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

John Graham

Kirsten Davies
SVP & Chief Information Security Officer
The Estée Lauder Companies
Biography

Craig  Froelich

Joey Johnson
CISO
Premise Health
ISE® Southeast Executive of the Year Award Winner 2017
ISE® North America Executive: Health Care Award Finalist 2017

Biography

Nathan Kennedy
AVP, Security
Molina Healthcare, Inc.
Biography


Cybersecurity executives and managers look at their security teams holistically, gauging the strengths and weaknesses of individual members as well as the unit as a whole. Specialized teams, such as a SOC team or a threat hunting team, often have and require different skills from the standard security team. Working remotely and hiring new members outside of the traditional work culture and environment have each added challenges in evaluating our security teams. Now that some are returning to the office, security leaders will need to determine the best ways to build, maintain, and retain their teams post-pandemic. We will need to reassess what work/life balance looks like, support diversity and inclusion in our teams, exercise greater emotional intelligence, and reevaluate how and where we hire candidates. Join our conversation as we discuss the tips, technology, and best practices we can use to reenergize team-building in our security teams to bolster them for even greater success in the months ahead.

ISE® National Summit 2021

The ISE® National Summit will be held August 17, 2021 on GoExhibit and Zoom, a digital platform experience. The ISE® National Summit is a one day Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from the information security industry to discuss and share insights into today's issues and solutions.Details

ISE® PRIVATE DINNER
Preventing Email-Borne Supply Chain Attacks

August 18, 2021
5:30pm - 8:30pm ET
Del Frisco’s Double Eagle Steakhouse Atlanta
236 Perimeter Center Parkway NE Suite 120
Dunwoody, GA 30346
Registration
James Edgar

James Edgar
Senior Vice President, Chief Information Security Officer
FleetCor
Biography

Your supply chain partners represent a significant cyber risk as demonstrated recently by the FireEye and SolarWinds breaches. More attackers are exploiting an organization’s suppliers, partners and vendors in order to launch business email compromise campaigns. These new tactics bypass cloud email defenses, legacy email gateways and email authentication standards. Mitigating breaches from a compromised supply chain requires a new approach to securing your third-party cloud and digital communications. Join our conversation to discuss common supply chain-based attack methods including partner spoofing, Business Email Compromise, new domain campaigns, and malicious URLs; real examples of supply chain phishing attacks; and the advanced, cloud-native email security techniques that proactively block these attacks in progress.

ISE® PRIVATE DINNER
Zero Trust: Migrating From Conceptual Model to Comprehensive Framework

September 14, 2021
5:30pm - 8:30pm ET
Oak Steakhouse
950 3rd St.
Alpharetta, GA 30009
Registration

Most organizations are now engaging in a Zero Trust journey as they prepare for more flexible, hybrid models of working. Protections around identity and devices are necessary and must cover both managed and unmanaged users, assets, resources and workstations. This includes any “decayed devices” that have been off the network since going remote. The lack of full visibility into these areas will prevent you from realizing the extent of your attack surface, leaving you unable to implement effective Zero Trust policies. Join our conversation where we will discuss how to take your Zero Trust roadmap from a conceptual model to a comprehensive framework that protects data; enables the principles of network isolation, segmentation and security; automates and orchestrates controls and processes; and more.

ISE® FIRESIDE WEBINAR
Increase Resiliency of Your OT Environment From a Ransomware Attack

September 30, 2021
2:00 PM – 2:30 PM ET
11:00 AM – 11:30 AM PT
Registration

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Antova_Galina Galina Antova
Co-Founder
Claroty
Biography

Dawn Cappelli
VP and CISO
Rockwell Automation
Biography

Cybersecurity threats come in various forms, including phishing, account compromises, and malicious email attachments. Often these threats result in ransomware attacks, which are causing great concern for most organizations due to the current cyber threat environment. Headlines are filled with stories about entire companies that have been brought to a halt and forced to pay large ransoms. To stay ahead of attacks, many companies focus their cybersecurity efforts on IT, forgetting the importance of the resiliency of their OT environment. That’s a critical mistake. After all, if your IT environment were suddenly compromised by ransomware, could you sever the connections to your OT environments, and if so, could your OT environments still operate without those connections? If you are not successful and OT is impacted by ransomware, could you recover? Any comprehensive cybersecurity strategy involves gaining visibility into OT environments to understand exactly what assets exist and their potential vulnerabilities—a protection strategy that includes the converged IT/OT infrastructure—and the people, processes, and technology to detect, respond, and recover from attacks. Join our conversation as we discuss approaches organizations are taking to reduce ransomware risks to your OT environment such as access control via proper network segmentation, endpoint protection, and disaster recovery with backup processes.

Attendees of this ISE® Fireside Webinar are eligible to earn one-half (0.5) CPE credit upon its conclusion.