Upcoming Events

T.E.N.’s ISE® Private Dinners originally scheduled through mid-May during this period are being rescheduled and those registered to attend will be sent updates on the new dates and reconfirmations on their registration once those dates are determined. In addition, at this time, ISE® Central Executive Forum & Awards originally scheduled for May 14 has been postponed. A new date is in progress and we will notify those of you in the Central U.S. when it has been determined. To view all rescheduled events, please click here. Kindly note that the upcoming events listed below will take place as outlined. We look forward to your participation and appreciate the support of all of T.E.N.’s Programs.

Included in the list of upcoming events below are our new offerings: ISE® Fireside Webinars, which will be held on Tuesdays and Thursdays through May from 2:00pm – 2:45pm EST/11:00am – 11:45am PST; and ISE® Cocktails & Conversations, invite-only evening events held on Tuesdays, Wednesdays, and Thursdays from 5:30-6:45pm (region-specific). Participants of these digital programs may earn 1 CPE per program attended.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

June 9, 2020
5:30 PM – 6:45 PM ET
Mid-Atlantic Region: Pennsylvania, Washington D.C., Maryland, Delaware, Virginia, West Virginia
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

young_roger

Roger Young
Director of Information Security and Compliance
Morgan, Lewis & Bockius LLP
Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 10, 2020
5:30 PM – 6:45 PM ET
Northeast Region: New York, New Jersey
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

James Morris

James Morris
SVP, Corporate Center Group, Information Security Officer
Citi
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 11, 2020
5:30 PM – 6:45 PM ET
Massachusetts, Toronto
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Hussey_Eric

Eric Hussey
CISO
PTC Inc.
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

June 16, 2020
5:30 PM – 6:45 PM CT
TOLA Region: Texas, Oklahoma, Louisiana, Arkansas, New Mexico
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Gary Toretti
SVP, Chief Information Security Officer
CBRE Holding, Inc.

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

June 17, 2020
4:30 PM – 5:45 PM MT
5:30 PM – 6:45 PM CT
6:30 PM – 7:45 PM ET
North Central Region: North Dakota, South Dakota, Minnesota, Iowa, Illinois, Wisconsin, Michigan, Indiana, Ohio, Kansas, Missouri, New Mexico, Nebraska
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Robert Allen

Robert Allen
Global Chief Information Security Officer
Gallagher

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

June 18, 2020
5:30 PM – 6:45 PM PT
West Coast: California, Washington
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kannan Perumal

Kannan Perumal
CISO
Applied Materials
Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Stop Buying Security Products: Fix Your Security Posture Using What You Have

June 23, 2020
5:30 PM - 6:45 PM ET
Northeast Region: Connecticut, Delaware, Maine, Massachusetts, Maryland, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont, Washington D.C.
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

OKeefe_John

John O’Keefe
CISO, Infrastructure & Operations AVP
GEICO

Is your organization protected against every known attack, including the vulnerabilities announced yesterday? Zero-day attacks garner plenty of attention, but the truth is 99% of all cyberattacks occur due to hackers exploiting existing or known vulnerabilities. You likely already have cybersecurity products that could protect you, but chances are they have not been configured correctly to your enterprise’s specific risk profile. For instance, Gartner estimates that 95% of firewall breaches are caused by simple firewall misconfigurations, yet 97% of breaches are still happening to companies that have already deployed the right controls. Breaches are arising more often because complexity is your enemy. If your security team is managing too many solutions—some of which might not be optimal for your current enterprise security requirements—then a simple misconfiguration or drift is all an attacker needs to exploit within your security stack to gain entrance. You do not need another security product. You just need to use what you have, better. Join our conversation as we discuss how to continually and safely test every part of your security infrastructure for gaps as well as how to prioritize remediation based on business risk.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Minding the Gap: What Is Missing From Our Security Technology Stack?

June 24, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Registration

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

name

Gary Hayslip
Director of Information Security (CISO)
SoftBank Group
ISE® West Executive of the Year Award Winner 2015
ISE® North America People's Choice Award Winner 2015

Biography

Leach_Chris

Chris Leach
Senior CISO Advisor
Cisco
Biography

Anahi Santiago
Chief Information Security Officer
Christiana Care Corporation
Biography

According to the World Economic Forum, business leaders regard cyberattacks as the top risk behind fiscal crises in advanced economics, making it imperative for CISOs and their teams to identify areas where greater protection is needed. Even before the pandemic, security and business leaders have experienced friction and shortcomings from their security technology stack, lacking capabilities in areas like automation, data management, incident response and others. Some struggle with overcomplicated stacks, where tools do not integrate well with each other and obscure visibility into vulnerabilities, while others have technology that simply does not cover all their security needs. With the nation-wide pivot towards remote work, security teams have discovered new vulnerabilities that either went unnoticed or unencountered before. Previously under-defended devices, work-from-home employees and niche areas like telehealth now comprise much bigger considerations as we search for gaps in our security stack. Join our conversation as we discuss best practices for identifying security vulnerabilities caused by your own technology and determining which tools and processes are needed for the future.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 24, 2020
5:30 PM - 6:45 PM PT
West Coast Region: Washington, California
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Kirkland_Andy

Andy Kirkland
CISO
Starbucks
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 25, 2020
5:30 PM - 6:45 PM CT
Texas Region: Austin, TX, Dallas, TX, Houston, TX
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Mike Coogan

Mike Coogan
Senior Director, Cybersecurity
Waste Management
ISE® Central Executive Award Winner Finalist 2015
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Security 2.0: Planning for 2020 and Beyond in a Remote Workforce World

June 30, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Registration

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

hanson_jadee

Jadee Hanson
CISO
Code42
Biography

The rulebook changed quite literally in March 2020 when companies across the US went 100% remote. This has reshaped and reset priorities for security, not just for the remainder of 2020 but also permanently. Digital initiatives that started off with 3-year roadmaps have become near to mid-term priorities for organizations as they build plans for an ever-increasing number of remote employees. While these expedited steps have been necessary, they also combine to create ideal conditions for insider threats, making it essential for organizations to revisit overall security strategies. What new challenges will security leaders face, and how are security leaders planning to tackle them? Join our conversation as we discuss the future of security that manages both in-office and remote work environments as well as the evolving role of security teams to include infrastructure planning, supporting higher percentages of digital employee onboarding and offboarding, incident response planning for insider threats, employee training and more.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

June 30, 2020
5:30 PM – 6:45 PM PT
Northwest Region: Northern California (San Francisco North), Oregon, Washington, Idaho, Montana, Wyoming, Alaska
Invitation only. If you are interested in attending, please contact: Deb Jones.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kevin Morrison

Kevin Morrison
MD, Enterprise Information Security, & CISO
Alaska Air Group
ISE® Southeast People’s Choice Award Winner 2015

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 13, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration
Medha Bhalodkar

Medha Bhalodkar
CISO, Enterprise IT Risk Officer
Columbia University
ISE® North America Executive Award Winner 2015 - Academic/Public Sector Category
ISE® North America Executive Award Winner 2016 - Academic/Public Sector Category
ISE® Northeast Executive Award Finalist 2018

Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Private Dinner will earn 2 CPEs upon its conclusion.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 14, 2020
5:30pm - 8:30pm
Steak 48
615 N. Wabash Ave
Chicago, IL 60611
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Private Dinner will earn 2 CPEs upon its conclusion.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 15, 2020
5:30pm - 8:30pm
Butcher & The Boar
1121 Hennepin Ave
Minneapolis MN 55403
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Private Dinner will earn 2 CPEs upon its conclusion.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 16, 2020
5:30pm - 8:30pm
Mastro’s Steakhouse
1650 W Loop S.
Houston, TX 77027
Registration

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Private Dinner will earn 2 CPEs upon its conclusion.

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2020 will be held August 20, 2020 at the Motif Seattle in Seattle, WA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Central Executive Forum and Awards 2020

Due to developments with the Novel Coronavirus, the ISE® Central Executive Forum and Awards 2020 originally scheduled for May 14, 2020, has been postponed until September 2, 2020. Read our statement to learn more.

The ISE® Central Executive Forum and Awards 2020 will be held September 2, 2020 in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Yours, Mine, Ours: Managing Insider Risk in the Era of Data Collaboration and Entitlement

September 9, 2020
5:30pm - 8:30pm
The Sea by Alexander's Steakhouse
4269 El Camino Real
Palo Alto, CA 94306
Registration

Whether it is an employee, third-party contractor, business partner or service provider, insider threat is the fastest growing risk organizations face today—and in today’s workplace, people and data are on the move like never before. Job tenure is declining as people switch jobs far more frequently, often taking enterprise data with them. At the same time, business leaders want to empower employees to be creative, innovative and collaborative, but this can be hindered if policies require data to be locked down. With the vectors by which data moves increasing at an unprecedented pace, the issue of protecting corporate data is getting more complex every day. How do we find a happy medium between securing our sensitive data and enabling our employees to thrive at their jobs? Join our conversation as we discuss the business need for real-time detection and response to combat the growing issue of insider threats to data as well as best practices for building a comprehensive insider threat program.

Attendees of the ISE® Private Dinner will earn 2 CPEs upon its conclusion.

ISE® PRIVATE DINNER
Yours, Mine, Ours: Managing Insider Risk in the Era of Data Collaboration and Entitlement

September 22, 2020
5:30pm - 8:30pm
Rod’s Steak & Seafood Grille
1 Convent Rd
Morristown, NJ 07960
Registration

Whether it is an employee, third-party contractor, business partner or service provider, insider threat is the fastest growing risk organizations face today—and in today’s workplace, people and data are on the move like never before. Job tenure is declining as people switch jobs far more frequently, often taking enterprise data with them. At the same time, business leaders want to empower employees to be creative, innovative and collaborative, but this can be hindered if policies require data to be locked down. With the vectors by which data moves increasing at an unprecedented pace, the issue of protecting corporate data is getting more complex every day. How do we find a happy medium between securing our sensitive data and enabling our employees to thrive at their jobs? Join our conversation as we discuss the business need for real-time detection and response to combat the growing issue of insider threats to data as well as best practices for building a comprehensive insider threat program.

Attendees of the ISE® Private Dinner will earn 2 CPEs upon its conclusion.

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards will be held November 12-13, 2020 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details