Upcoming Events

ISSA-LA Summit XI
Paying It Forward: Cultivating a New Cybersecurity Workforce

May 17, 2019
11:50am - 12:40pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
Registration
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Antova_Galina Galina Antova
Co-Founder
Claroty
Merritt_Marian Marian Merritt
Lead for Industry Engagement
National Initiative for Cybersecurity Education (NICE)
Biography
Nather_Wendy Wendy Nather
Head, Advisory CISOs for Duo Security
Cisco
Biography
Steffens_Jennifer

Jennifer Sunshine Steffens
CEO
IOActive
Biography

Women and minorities constitute half of technology users, making it only natural for current cybersecurity professionals to look to them as the next generation to carry the torch. Not only is it important to have a cybersecurity workforce that reflects the diversity of its tech users, but also it is a necessity to pursue at a time when both the growth and the talent shortage of the industry are at an all-time high. In order to obtain and mentor this next generation of skilled, ambitious young people, we must put in the work and pass on what we have learned to them. Join our conversation as our panel of leading security executives discuss how to develop and cultivate this next generation workforce and how to locate and inspire them. They will also share their personal success stories and insights on how to make new connections as well as tips for expanding your professional network.

ISSA-LA Summit XI
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

May 17, 2019
2:30pm - 3:20pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
Registration
More information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

May 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration
Raymond Lipps

Raymond Lipps
Executive Director, Chief Information Security Officer
Celgene Corporation

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

WEBINAR: The Economic and Trade Mission at the Embassy of Israel
Why Relationships Matter: Bridging the Gap Between U.S. CISOs and Israeli Security Vendors

June 3, 2019
9:00am EST – 10:00am EST
4:00pm IDT – 5:00pm IDT
Registration

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

In today’s cybersecurity-centric world, it’s no secret that U.S. CISOs are some of the busiest, most in-demand executives of all time, making appeals to the board for support and leading their teams through complex rollouts and management of their security programs. As well-funded cybersecurity programs have become a competitive and regulatory advantage in this era of security breaches and technological advancement, U.S. CISOs need to find the best security solutions that will help solve their enterprise’s unique challenges—and the best solutions may be beyond their borders. However, most have little time to meet with U.S.-based vendors, not to mention Israeli providers. While the Israeli cybersecurity industry is world famous and enjoys an excellent reputation in the U.S., Israeli cyber vendors also face specific challenges to succeed in the U.S. market:

  • Israeli cyber startups’ competitive advantage is their ability to address a specific pain point using innovative solutions that other cyber vendors frequently do not possess. How can these Israeli cyber firms identify CISOs who face the specific challenge that the Israeli firm addresses?
  • As one U.S. CISO told us, the best place to find cybersecurity teams from major organizations is not in the Exhibit Hall at large cyber events like RSA, but at off-site gatherings. How can Israeli cyber vendors get “in the room” where relationships are built?
  • Cyber vendors everywhere—not only in Israel—need to understand that antiquated marketing tactics do not impress U.S. CISOs and rarely lead to follow-up communications or meaningful interactions with vendors, let alone a sale. U.S. CISOs have become increasingly willing to simply end relationships with vendors of any nationality who push their products and overstep boundaries. How can Israeli cyber vendors find the right balance between pushing too hard and not being aggressive enough?
  • When working with the cybersecurity team of a Fortune 500 company, what is a sales cycle typically like? How can Israeli vendors work with the client’s team to ensure a more effective and productive sales process?

Rocky Mountain Information Security Conference 2019
Empower Cyber Security Leadership Through Emotional Intelligence

June 6, 2019
11:15am - 12:15pm
Colorado Convention Center
700 14th St
Denver, CO 80202
Register
More Information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Research has clearly shown that a person can have the best training in the world, a sharp, analytical mind and an endless supply of good ideas, but these alone will not make them a great leader. While these factors are all important, to be an effective leader, one must also possess a high degree of Emotional Intelligence (EI). This is especially true for information and cybersecurity professionals. Harnessing Emotional Intelligence ensures effective communication between InfoSec executives and their security teams as well as communication between security executives, stakeholders, teammates, lines of business leaders, customers, and board members. Strong working relationships and interpersonal skills are the keys to success in every area of human activity, especially for a cybersecurity professional looking to enhance their leadership skills and bring out the best in their teams. Join Marci McCarthy as she discusses how you can best utilize Emotional Intelligence to get ahead, learn how to be authentic to yourself, how to shape your conversations as a thought leader, and how to improve confidence and professionalism.

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

June 11, 2019
5:30pm - 8:30pm
The Palm
1750 Tysons Blvd
McLean, VA 22102
Registration
Frank Aiello

Frank Aiello
VP, CISO
Maximus
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016

Biography

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

June 25, 2019
5:30pm - 8:30pm
Perry's Steakhouse & Grille - Austin Downtown
114 W. 7th Street #110
Austin, TX 78701
Registration
Allgeier_Michael

Michael Allgeier
Director, Critical Infrastructure Security
ERCOT
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

2019 Community College Cyber Summit
Becoming a Cybersecurity Enabler: How Community Colleges Can Bridge the Diversity and Workforce Gap

August 1, 2019
9:00am - 9:30am
Bossier Parish Community College
6220 E Texas St
Bossier City, LA 71111
Registration
More information

Keynote Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Leaders in the cybersecurity industry recognize that there is a lack of women and diversity among their teams. Even though women and minorities nearly comprise half of the general workforce, they only make up a small portion of cybersecurity professionals despite millions of jobs going unfilled and rising cyberattacks. In the past, employers have maintained a structured mindset about candidates’ qualifications to include four-year or advanced degrees, proven industry experience and like-minded thinking. However, due to the shortage of qualified cybersecurity talent, we are experiencing a paradigm shift in how we view these hiring requirements. We now need candidates who are gamechangers, who can bring much needed soft skills, passions and differing opinions that can take team thinking to the next level. With their various perspectives, women and minorities must be encouraged to enter the field as early as possible, but it’s also crucial that they maintain a passion to learn and succeed by cultivating the necessary skills to stay there. Fortunately, they can obtain technical skills and certifications by pursuing specialized training, work-study programs and apprenticeships, such as those offered by cyber boot camps, technical schools and community colleges. Currently, though, community colleges and similar establishments experience challenges with marketing themselves as security partners who enable cybersecurity professional development. To connect upcoming, diverse talent with employers who need them, community colleges can adapt and enhance the way they interact with both groups. Join us as we share our insights about the challenges community colleges face in becoming cybersecurity enablers, facilitating job readiness and contributing to solve the industry’s diversity and workforce shortage.

ISE® VIP PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

August 6, 2019
5:30pm - 8:30pm
Charlie Palmer Steak at Four Seasons
3960 S Las Vegas Blvd
Las Vegas, NV 89119
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® VIP PROGRAM - THE SUPERCAR DRIVING EXPERIENCE
AppSec That Won’t Slow You Down

August 7, 2019
5:30pm - 8:30pm
Las Vegas Motor Speedway
Exotics Racing Racetrack
7065 Speedway Blvd
Las Vegas, NV 89115
Registration

Saltworks Security Executive Speaker:

hurst_dennis

Dennis Hurst
Founder
Saltworks Security

ISE® VIP Host

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Today’s market demands will not let software development wait for security to catch up. Even if you have the right team, expertise, tools, and training in place to achieve your business goals, it won’t matter if your approach to application security is outdated. Like an airbag that is installed after a car is driven off the lot, AppSec cannot wait to be applied at later stages. Instead, security teams will achieve the most out of AppSec if they focus on weaving customized security into the DNA of each unique software development lifecycle. In order to achieve this, they will need to have an AppSec program in place that is ongoing, where DevOps teams can maintain security and necessary technologies can continue to implement it moving forward—all at optimal speeds. Join our conversation as we discuss how companies can create and manage AppSec programs that run as predictably, effectively, and measurably as a well-oiled machine.

Transportation will be provided to Las Vegas Motor Speedway from the Mandalay Bay Hotel starting at 4:30 p.m. Please meet at the Mandalay Bay Tour Bus Lobby and shuttle bus service will be provided to the event. The last shuttle bus will leave Mandalay Bay at 5:20 p.m.

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2019 will be held August 22, 2019 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2019

The ISE® Northeast Executive Forum and Awards 2019 will be held October 3, 2019 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards 2019 will be held November 13-14, 2019 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details