Upcoming Events

Participants of digital programs may be eligible to earn 1 or more CPEs per program attended depending on format. For information on our ISE® Programs and Events as they relate to COVID-19, you may view our statement here.

ISE® PRIVATE DINNER
Securing a Modern, Cloud Enabled Workforce

September 28, 2022
5:30pm - 8:30pm ET
Smith & Wollensky
Easton Town Center
4145 The Strand W
Columbus, OH 43219
Registration
Robert Vaile

Robert Vaile
Assistant Vice President, Chief Information Security Officer
Grange Insurance
Biography

As a security executive, it is safe to assume you believe in the guiding cybersecurity principle that good is not good enough – and often will seek out innovative ways to do better even during the most stressful times. With an unprecedented transition to Work from Home (WFH) between 2020 and 2021, you were abruptly thrust into to relying on unmanaged personal devices and home networks that lacked security hygiene to provide remote access to your most sensitive data and network resources. This, coupled with the rapid migration of traditional enterprise applications to browser-based SaaS applications over the last several years, lands you where we are today, with your employees now spending most of their workday in a browser to access data and applications, often on unmanaged devices over unsecured networks. The browser has effectively become the new office and is forever changing how, when and where we work. Join us for an engaging dinner discussion on how you can find a balance between data security and productivity. We will also explore how the browser ultimately has extended the enterprise architecture and answer the question, "What if the browser was built for the enterprise?"

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
Staying Ahead of the Curve: How Cybersecurity Executives Can Focus on Preventing Evasive HEAT Attacks

September 29, 2022
5:30pm - 8:30pm ET
Angus Barn Restaurant & Lakeside Pavilion
9401 Glenwood Avenue
Raleigh, NC 27617
Registration
Jim Nelms

Jim Nelms
Chief Information Security Officer
Smithfield Foods
ISE® North America Executive: Health Care Award Finalist 2020
Biography

Just like any business or industry, cybercriminals are continually on the lookout for ways to innovate and remain relevant as trends and market dynamics evolve. The shift to remote and hybrid work and acceleration of cloud adoption has transformed the daily routines for most workers, with most of it revolving around the browser. It only makes sense from an attacker’s perspective to cast a line where the majority of fish are swimming because they can evade detection from traditional security tools. It then comes as no surprise that Highly Evasive Adaptive Threats (HEAT) represent an important evolution in attacker techniques to exploit key gaps in traditional security defenses. Join us for a forward-thinking discussion on how organizations can focus on three key tenets to limit their susceptibility to these types of attacks: shifting from a detection to a proactive mindset, stopping threats before they hit the endpoint, and incorporating advanced anti-phishing and isolation capabilities. We will also explore how HEAT attacks evade existing security defenses where hackers exploit the weaknesses of the existing security stack, are building sophisticated delivery mechanisms to evade detection as well as how to prevent them.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
Staying Ahead of the Curve: How Cybersecurity Executives Can Focus on Preventing Evasive HEAT Attacks

October 4, 2022
5:30pm - 8:30pm MT
Dominick's Steakhouse
15169 N. Scottsdale Road
Scottsdale, AZ 85254
Registration
Brenda Ferraro

Brenda Ferraro
Head of Technology Third Party Governance
Wells Fargo
Biography

Just like any business or industry, cybercriminals are continually on the lookout for ways to innovate and remain relevant as trends and market dynamics evolve. The shift to remote and hybrid work and acceleration of cloud adoption has transformed the daily routines for most workers, with most of it revolving around the browser. It only makes sense from an attacker’s perspective to cast a line where the majority of fish are swimming because they can evade detection from traditional security tools. It then comes as no surprise that Highly Evasive Adaptive Threats (HEAT) represent an important evolution in attacker techniques to exploit key gaps in traditional security defenses. Join us for a forward-thinking discussion on how organizations can focus on three key tenets to limit their susceptibility to these types of attacks: shifting from a detection to a proactive mindset, stopping threats before they hit the endpoint, and incorporating advanced anti-phishing and isolation capabilities. We will also explore how HEAT attacks evade existing security defenses where hackers exploit the weaknesses of the existing security stack, are building sophisticated delivery mechanisms to evade detection as well as how to prevent them.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
Zero Trust: Migrating From Conceptual Model to Comprehensive Framework

October 6, 2022
5:30pm - 8:30pm CT
Carlucci
6111 N. River Road
Rosemont, IL 60018
Registration
Brian McSweeney

Brian McSweeney
Regional Information Security Officer
Northern Trust

Most organizations are now engaging in a Zero Trust journey as they prepare for more flexible, hybrid models of working. Protections around identity and devices are necessary and must cover both managed and unmanaged users, assets, resources and workstations. The lack of full visibility into these unagentable and unmanaged areas will prevent you from realizing the extent of your attack surface, leaving you unable to implement effective Zero Trust policies. Join our conversation where we will discuss how to take your Zero Trust roadmap from a conceptual model to a comprehensive framework that protects data; enables the principles of network isolation, segmentation and security; automates and orchestrates controls and processes; and more.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
The CISO Plan of Attack: Taking Control of the Digital Infrastructure from the Outside In

October 11, 2022
5:30pm - 8:30pm ET
The Capital Grille
Tysons Corner
1861 International Drive
McLean, VA 22102
Registration

With more than three-in-five companies targeted by software supply chain attacks, the external attack surface is the new threat vector - and it grows day by day. For too long, many IT and security teams have struggled to gain the right level of visibility into all assets, making it harder to secure them. This is because an organization’s attacker-exposed IT assets reside in a myriad of different places from being on-premise, in the cloud, and in subsidiary networks, as well as those in third-party vendors' environments. These digital assets can be secure or vulnerable, known or unknown, in active use or not --- regardless of whether the IT or security team has an awareness of them.

Join us for engaging discussion on how today’s sophisticated attacks involve extensive, automated reconnaissance efforts that analyze your attack surface from the outside in and how to remediate issues before they become exploited. Our special guests will also explore how a digital risk management platform can discover your entire attack surface, prioritize your risks, and gain control through continuous monitoring from cyberattacks like ransomware. In addition, we will explore how to satisfy key elements of most common security frameworks and align with many regulatory compliance standards.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
The CISO Plan of Attack: Taking Control of the Digital Infrastructure from the Outside In

October 18, 2022
5:30pm - 8:30pm ET
Truluck's Ocean's Finest Seafood & Crab
777 Brickell Avenue
Miami, FL 33131
Registration

With more than three-in-five companies targeted by software supply chain attacks, the external attack surface is the new threat vector - and it grows day by day. For too long, many IT and security teams have struggled to gain the right level of visibility into all assets, making it harder to secure them. This is because an organization’s attacker-exposed IT assets reside in a myriad of different places from being on-premise, in the cloud, and in subsidiary networks, as well as those in third-party vendors' environments. These digital assets can be secure or vulnerable, known or unknown, in active use or not --- regardless of whether the IT or security team has an awareness of them.

Join us for engaging discussion on how today’s sophisticated attacks involve extensive, automated reconnaissance efforts that analyze your attack surface from the outside in and how to remediate issues before they become exploited. Our special guests will also explore how a digital risk management platform can discover your entire attack surface, prioritize your risks, and gain control through continuous monitoring from cyberattacks like ransomware. In addition, we will explore how to satisfy key elements of most common security frameworks and align with many regulatory compliance standards.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
Digital Experiences Your Customers Can Trust

October 19, 2022
5:30pm - 8:30pm CT
Nick & Sam's
3008 Maple Avenue
Dallas, TX 75201
Registration

Technological failures aren’t just an inconvenience — they’re a breach of trust. Customers need assurance that sites will remain performant regardless of traffic spikes and fluctuations, while relaying reliable information. In the same fashion, APIs are the building blocks for modern web and mobile applications, as well as machine-to-machine communication. Join us for an engaging conversation to hear how applications, when delivering a faster user experience with greater origin offload, can reap a trifecta of benefits to include stability, cost savings and increased revenue. We also will explore how to drive less traffic to your API servers with greater predictability and uniformity of requests to origin; along with discussing how highly sensitive content, that should not be cached, such as PII, can still accelerate network performance, gain real-time visibility into potential threats, and push out new security rules globally in seconds.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
Driving Business Value Through Cloud and Containers

October 25, 2022
5:30pm - 8:30pm ET
Lattanzi
361 W 46th Street
New York, NY 10036
Registration
Merritt Baer

Merritt Baer
Principal Security Architect
Amazon Web Services (AWS)
Biography

Enterprises embrace the cloud for speed, scale, and flexibility in transforming business operations. With cloud footprints constantly changing, and threats such as ransomware moving at machine speed, real-time prevention, detection, and automated response are your backstop. Join us for an engaging discussion on how catching runtime threats when other security controls cannot keep cloud operations running smoothly. We will also explore the best practices in bringing forth runtime visibility and security to AWS workloads, how to defend enterprise and customer data from ransomware, crypto-mining malware, and zero days when your cloud journey continues to accelerate.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

Additionally, T.E.N. will be providing a car service that is unique to the event for each reconfirmed executive. This will ensure a safe method of transportation to and from the event for all of our guests.

ISE® PRIVATE DINNER
Securing a Modern, Cloud Enabled Workforce

November 1, 2022
5:30pm - 8:30pm CT
Gibsons Bar & Steakhouse
5464 N. River Road
Rosemont, IL 60018
Registration
Richard Rushing

Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography

As a security executive, it is safe to assume you believe in the guiding cybersecurity principle that good is not good enough – and often will seek out innovative ways to do better even during the most stressful times. With an unprecedented transition to Work from Home (WFH) between 2020 and 2021, you were abruptly thrust into to relying on unmanaged personal devices and home networks that lacked security hygiene to provide remote access to your most sensitive data and network resources. This, coupled with the rapid migration of traditional enterprise applications to browser-based SaaS applications over the last several years, lands you where we are today, with your employees now spending most of their workday in a browser to access data and applications, often on unmanaged devices over unsecured networks. The browser has effectively become the new office and is forever changing how, when and where we work. Join us for an engaging dinner discussion on how you can find a balance between data security and productivity. We will also explore how the browser ultimately has extended the enterprise architecture and answer the question, "What if the browser was built for the enterprise?"

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE DINNER
The Shift to Industry 4.0: What it Means for Security & Digital Trust

November 10, 2022
5:30pm - 8:30pm CT
Steak 48
River Oaks District
4444 Westheimer Road
Houston, TX 77027
Registration

For many years, the industrial sector used private networks to control critical infrastructure and operations. Now, with the movement toward ‘Industry 4.0,’ every system is connected online to reduce costs, increase efficiency, and improve operations. But these advantages create new vulnerabilities, as hackers now seek to exploit weak or unprotected access points. Without digital identity and authentication, industrial IoT (IIoT) initiatives are easily compromised, putting your employees and customers at risk. Join us for an engaging discussion on the latest trends in protecting critical infrastructure in the industrial and energy sector. We will also explore best practices in PKI, certificate management, and code signing to establish digital trust, even in hard-to-reach and remote locations.

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® PRIVATE WELCOME DINNER
Sponsored by Cyera

November 30, 2022
5:30pm - 8:30pm CT
Nick & Sam's
3008 Maple Avenue
Dallas, TX 75201
Registration

T.E.N. will follow COVID-19 precautions as recommended by the CDC and/or outlined by the venue. Guests are welcome to wear a mask.

ISE® West Summit and Awards 2022

The ISE® West Summit and Awards 2022 were held on December 1, 2022 at the Westin Galleria Dallas Hotel in Dallas, TX.

The ISE® West Awards are held in conjunction with a one day Executive Forum which included keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the nation to discuss and share insights into today's issues and solutions. Details