Upcoming Events

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 19, 2019
5:30pm - 8:30pm
American Cut Steakhouse
3035 Peachtree Rd NE #140
Atlanta, GA 30305
Registration

Keyaan Williams
CEO
Cyber Leadership and Strategy Solutions, LLC
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

March 20, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Registration
Hara_Moriah

Moriah Hara
CISO Board Advisor
Clearsky Fund-and Glilot Capital
ISE® Northeast Executive Award Finalist 2017
ISE® North America Executive: Commercial Award Finalist 2017

Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

March 21, 2019
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Registration
Khalfan_Shaun

Shaun Khalfan
VP, Information Security
Freddie Mac
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

March 27, 2019
5:30pm - 7:00pm
Smyrna Goodwill
3205 South Cobb Dr SE
Smyrna, GA 30080
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

March 28, 2019
5:30pm - 8:30pm
J&G Steakhouse
The Phoenician Scottsdale
6000 E Camelback Rd
Scottsdale, AZ 85251
Registration
Marion_Shaun

Shaun Marion
Vice President and Chief Security Officer
Honeywell International

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Risk Is a Board Game: Navigating Board Conversations on Cybersecurity Risk

April 4, 2019
5:30pm - 8:30pm
One Market
1 Market Street
San Francisco, CA 94105
Registration
Selim Aissi

Selim Aissi
Senior Vice President & Chief Security Officer
Ellie Mae
Biography

You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board a) has forgotten what you told them in the last meeting, and b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background. Join our conversation as we discuss how to properly navigate these board-level conversations and how you can provide them with answers that matter.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 9, 2019
5:30pm - 8:30pm
Murray’s
26 South 6th Street
Minneapolis, MN 55402
Registration

John Valente
Chief Information Security Officer
The 3M Company
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 10, 2019
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
4322 W Boy Scout Blvd.
Tampa, FL 33607
Registration

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

April 17, 2019
5:30pm - 8:30pm
Morton's The Steakhouse - Downtown Houston
1001 McKinney St
Houston, TX 77002
Registration

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 23, 2019
5:30pm - 8:30pm
The Capital Grille
444 Brickell Avenue
Miami, FL 33131
Registration

Connie Barrera
Corporate Director, Chief Information Security Officer
Jackson Health System
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 24, 2019
5:30pm - 8:30pm
St. Elmo Steak House
127 S. Illinois St.
Indianapolis, IN 46225
Registration
wilcox_dustin

Dustin Wilcox
Vice President and Chief Information Security Officer
Anthem, Inc.

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

2019 Charlotte-Metro ISSA Summit
From Coder to CISO, Developer to Director: How to Advance in Cybersecurity

May 2, 2019
1:15pm - 2:15pm
Charlotte Convention Center
501 S College Street
East Wing
Charlotte, NC 28202
Registration
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists coming soon!

The cybersecurity industry is in desperate need of people with the skills and willingness to work in the trenches. Engineers, coders, analysts, developers, and others are crucial for any cybersecurity platform to succeed and flourish, but once security professionals find themselves in these positions, it can be hard for them to advance further up the ladder. It’s not a question of what position they would choose to advance to, but rather how they will advance into management and C-level roles. Success seems elusive only because it is rarely clear-cut, taking many forms and leading you down paths you don’t expect. That doesn’t mean you have to traverse the path alone, without any guidance to light your way, or stay stuck where you are. Join our conversation as leading security professionals discuss their insights, perspectives, and career experiences, exploring how they obtained their current positions and what advice they can give fellow security professionals about growing within the industry.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 7, 2019
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 9, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® Central Executive Forum and Awards 2019

The ISE® Central Executive Forum and Awards 2019 will be held May 15, 2019 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

Rocky Mountain Information Security Conference 2019
Empower Cyber Security Leadership Through Emotional Intelligence

June 6, 2019
11:15am - 12:15pm
Colorado Convention Center
700 14th St
Denver, CO 80202
Register
More Information
Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Research has clearly shown that a person can have the best training in the world, a sharp, analytical mind and an endless supply of good ideas, but these alone will not make them a great leader. While these factors are all important, to be an effective leader, one must also possess a high degree of Emotional Intelligence (EI). This is especially true for information and cybersecurity professionals. Harnessing Emotional Intelligence ensures effective communication between InfoSec executives and their security teams as well as communication between security executives, stakeholders, teammates, lines of business leaders, customers, and board members. Strong working relationships and interpersonal skills are the keys to success in every area of human activity, especially for a cybersecurity professional looking to enhance their leadership skills and bring out the best in their teams. Join Marci McCarthy as she discusses how you can best utilize Emotional Intelligence to get ahead, learn how to be authentic to yourself, how to shape your conversations as a thought leader, and how to improve confidence and professionalism.

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2019 will be held August 22, 2019 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2019

The ISE® Northeast Executive Forum and Awards 2019 will be held October 3, 2019 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards 2019 will be held November 13-14, 2019 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details