Archived Events 2015

ISE® PRIVATE DINNER
Securing the Supply Chain

December 16, 2015
5:30pm - 8:30pm
The Capital Grille
1301 4th Avenue
Seattle, WA 98101
John Martin

John Martin
Program Manager, COTS Software Security
The Boeing Company
Biography

Shifts in technology have enabled global productivity and collaboration, but also have erased the network perimeter, motivating malicious attackers to refocus their sights on a new attack vector. IT supply chains, which often rely on disparate hardware and software suppliers from around the world, are becoming an increasingly tempting target. As a number of recent breaches have shown, the risks of compromise via third-party vectors are a serious issue and merit a firm commitment to due diligence of supply chain partners. Join our conversation to learn how you can implement a structured, policy-based approach to securing the supply chain and better assessing the security of third-party applications.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

December 15, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Prentis Brooks

Prentis Brooks
Director, Cyber Security
Time Warner Cable
Biography

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

December 10, 2015
5:30pm - 8:30pm
The Palm Restaurant, Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326
Kevin Morrison

Kevin Morrison
Associate Director of Information Security
Jones Day
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

December 9, 2015
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
Chris Camacho

Chris Camacho
SVP Global Information Security
Bank of America
Biography

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

December 3, 2015
5:30pm - 8:30pm
Seven Steakhouse
700 Hennepin Avenue
Minneapolis, MN 55403

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

December 2, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY
Linda Cooper Angles

Linda Cooper Angles
Sr. Director, Information Security Risk Management
Thomson Reuters
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

December 1, 2015
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
1426-28 Chestnut St
Philadelphia, PA 19102
Myrna Soto

Myrna Soto
Corporate SVP and Global CISO
Comcast Corporation
Biography

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
Securing the Supply Chain

November 18, 2015
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, OH 43215
David Todd

David Todd
Chief Information Security Officer
State Auto Insurance
Biography

Shifts in technology have enabled global productivity and collaboration, but also have erased the network perimeter, motivating malicious attackers to refocus their sights on a new attack vector. IT supply chains, which often rely on disparate hardware and software suppliers from around the world, are becoming an increasingly tempting target. As a number of recent breaches have shown, the risks of compromise via third-party vectors are a serious issue and merit a firm commitment to due diligence of supply chain partners. Join our conversation to learn how you can implement a structured, policy-based approach to securing the supply chain and better assessing the security of third-party applications.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

November 17, 2015
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church Street
Nashville, TN 37219
Scott Breece

Scott Breece
Vice President of Security, Chief Information Security Officer
Community Health Systems, Inc.
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® North America Leadership Summit and Awards 2015

The ISE® North America Leadership Summit and Awards will be held November 10-11, 2015 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® NORTH AMERICA PRIVATE DINNER
Effectiveness of Information Protection Technologies to Drive Operational Security Efficiency

November 9, 2015
5:30pm - 8:30pm
David Burke's Primehouse
616 North Rush Street
Chicago, IL 60611
Kevin Novak

Kevin Novak
CISO and IT Risk Officer
Northern Trust

The reality of today’s threat landscape is that no single product or service can solve every problem. The principals of multi-layered security architecture, integrating people, processes and technology is more important today, than it has ever been in the past. As organizations strive to find the right balance while under the pressure of shifting budgetary control, there is a light at the end of the tunnel. By adopting best practices, developing operational processes, and fine tuning those procedures, you can drive increases in your operational security model. Join our conversation to discover how to reduce ongoing expenditures by enabling the successful adoption of InfoSec controls, operated by educated staff and integrated into your organizations operational processes.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

November 5, 2015
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
250 Northern Ave
Boston, MA 02210
Larry Wilson

Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 -
Academic/Public Sector Category

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Cybersecurity in the Era of Cloud: Best Practices To Secure Data In the Cloud

November 4, 2015
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center
Dunwoody, GA 30346
Phil Agcaoili

Phil Agcaoili
Chief Information Security Officer
Elavon
Biography

-->

Cloud applications like Salesforce, Google Apps, Box and Office 365 are becoming the preferred model of application delivery. With critical data now in the cloud, how do you balance the business needs of collaboration and productivity while keeping sensitive data safe? What new risks and threats should be considered to avoid making the headlines? How do you build in-house cloud security competency, and extend security and governance to cloud applications? Join our conversation to explore best practices of how to gain visibility, governance and protection of cloud applications, and how new tools/technologies like cloud access security brokers can help.  

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

November 2, 2015
5:30pm - 8:30pm
The Arrogant Butcher
2 East Jefferson St #150
Phoenix, AZ 85004
Rajat Sen

Rajat Sen
Director of Information Security
Republic Services

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
The State of Cybersecurity: Rethink your Endpoint Security Strategy

October 28, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
2222 McKinney Ave
Dallas, TX 75201
Jack Key

Jack Key
Chief Information Security Officer
Brinks
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

October 27, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
788 W. Sam Houston Parkway North
Houston, TX 77024
Sanjeev Sah

Sanjeev Sah
Chief Information Security Officer
Texas Children’s Hospital

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

October 22, 2015
5:30pm - 8:30pm
McCormick & Schmick's
800 Nicollet Mall
Minneapolis, MN 55402
Brad Maiorino

Brad Maiorino
Chief Information Security Officer
Target Corporation
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
Know Thy Enemy: Using Intruder Analytics to Detect Compromise

October 21, 2015
5:30pm - 8:30pm
McCormick and Schmick’s Seafood & Steaks
301 Fifth Ave
Pittsburgh, PA 15222

When disaster strikes, time is of the essence. What’s the first thing you would do in the event of a breach? If your network has been compromised, your team must act quickly and efficiently to detect the compromise and respond before serious damage is done. Think minutes – not hours. Join this conversation to learn about how intruder analytics can help accelerate investigation and containment by identifying hard to detect attacker movements, phishing attacks and more, and instantly link actions to the users and assets impacted. We’ll also talk about how we can better prepare for an incident and respond effectivity if an incident occurs.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

October 19, 2015
5:30pm - 8:30pm
The Town
716 Laurel Street
San Carlos, CA 94070
Rich Baich

Rich Baich
Chief Information Security Officer
Wells Fargo & Company
Biography

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs.

ISSA International Conference: Pathways to Empowered Security Leadership

October 12-13, 2015
10:00 am-10:45 am
Chicago Marriott Downtown Magnificent Mile
540 North Michigan Ave
Room: Northwestern/Ohio State
Chicago, IL 60611
Track: Business Skills for the Information Security Professional
Detailed Agenda
More Details
Marci McCarthy

Marci McCarthy
CEO & President
T.E.N.
Biography

Panelists include:
Todd Fitzgerald, Global Director Information Security, Grant Thornton International, Ltd.
Richard Rushing, CISO, Motorola
Larry Lidz, CISO, CNA Insurance
Jeff Reich, Chief Security Officer, Barricade.io

The evolving security leader can seamlessly blend technical knowledge with business acumen to serve as a trusted partner to the board and the business…but no one starts at the top. During this invaluable panel discussion, top CISOs and information security leaders will share personal stories about when and where their careers began, what pivotal events launched them into leadership, and what has empowered them to grow stronger in the field. Security professionals at any level of experience will benefit from hearing the advice, knowledge and personal challenges these leaders have faced on their pathways to empowered security leadership.

ISE® Northeast Private Welcome Dinner
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management

October 7, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY
Jay Wright

Jay Wright
Information Security Officer
Citigroup Inc.
Biography

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

ISE® Northeast Executive Forum and Awards 2015

The ISE® Northeast Executive Forum and Awards 2015 will be held on October 8, 2015 in New York City, NY. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 30, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
65 East Wacker Place
Chicago, IL 60601
Dimitra Kane

Dimitra Kane
Enterprise Architecture Sr. Manager
Discover Financial Services
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Bridging the Gap between the Digital Battlefield and the Boardroom

September 29, 2015
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, OH 43215
Chris McFarland

Chris McFarland
Information Security Officer
Abercrombie & Fitch
Biography

With the rapid pace of change in technology it is more imperative than ever to make the right decisions on cyber security needs and appropriately demonstrate business risks. But how do you make the right decisions amongst a backdrop of increasing board oversight, evolving government standards, scarcity of security talent, and a myriad of technology options? No matter the industry, the need for a strong technology foundation coupled with a strong working connection between the CISO and the C-suite/Board of Directors is vital to ensuring that your organization can effectively tackle cyber risks of all types and sources. Join our conversation to learn more about how your team can improve your organization’s preparedness through C-suite and board engagement, enterprise risk management methodologies, and enterprise-wide risk management programs. If you are interested in attending, please contact Deb Jones or Kate Parnell.

InfoSec Nashville: Pathways to Empowered Security Leadership

September 29, 2015
2:15 pm –3:05 pm
Music City Center
201 5th Avenue South
Room: #214
Nashville, TN 37203
More Details
Marci McCarthy

Marci McCarthy
CEO & President
T.E.N.
Biography

Panelists include:
Kyle Duke, CIO, TENN Care
Bob Quandt, Exec Director of Security, Healthways
Scott Breece, CISO, CHS
Michael Mangold, Director of Security, Tractor Supply

The evolving security leader can seamlessly blend technical knowledge with business acumen to serve as a trusted partner to the board and the business…but no one starts at the top. During this invaluable panel discussion, top CISOs and information security leaders will share personal stories about when and where their careers began, what pivotal events launched them into leadership, and what has empowered them to grow stronger in the field. Security professionals at any level of experience will benefit from hearing the advice, knowledge and personal challenges these leaders have faced on their pathways to empowered security leadership.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 28, 2015
5:30pm - 8:30pm
Lockeland Table
1520 Woodland St.
Nashville, TN 37206
Greg Schaffer

Greg Schaffer
VP & Information Security Officer
FirstBank
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Cybersecurity in the Era of Cloud: Best Practices To Secure Data In the Cloud

September 24, 2015
5:30pm - 8:30pm
Dallas Chop House
1717 Main St #100
Dallas, TX 75201
Angel Mosley

Angel Mosley
Information Security Officer
Fiserv
Biography

Cloud applications like Salesforce, Google Apps, Box and Office 365 are becoming the preferred model of application delivery. With critical data now in the cloud, how do you balance the business needs of collaboration and productivity while keeping sensitive data safe? What new risks and threats should be considered to avoid making the headlines? How do you build in-house cloud security competency, and extend security and governance to cloud applications? Join our conversation to explore best practices of how to gain visibility, governance and protection of cloud applications, and how new tools/technologies like cloud access security brokers can help.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

September 23, 2015
5:30pm - 8:30pm
Trump International Hotel & Tower Toronto
Bay Street Room, 30th Floor
325 Bay Street
Toronto, ON M5H 4G3

Ray Archer

Ray Archer
Senior VP and Chief Information Security Officer
Scotiabank
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Keeping the Crown Jewels Under Lock and Key: Protecting Your Enterprise from SAP Vulnerabilities

September 23, 2015
5:30pm - 8:30pm
Fleming's Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346

Tony Spurlin

Tony Spurlin
Chief Information Security Officer
Cox Automotive
Biography

Virtually every SAP application is vulnerable to financial fraud, sabotage or espionage from cyber-attacks targeting these business-critical systems. They are the lifeblood of the world’s largest companies as they manage their most sensitive information and critical processes. Despite housing an organization’s “crown jewels,” SAP systems and their application layer are not protected by traditional security solutions. Join our conversation to learn more about the most critical SAP security vulnerabilities, public exploits and defense strategies.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

September 22, 2015
5:30pm - 8:30pm
LB Steak
334 Santana Row, Suite 1000
San Jose, CA 95128
Kannan Perumal

Kannan Perumal
Chief Information Security Officer
Applied Materials
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 17, 2015
5:30pm - 8:30pm
The Capital Grille
2502 E Camelback Rd, Suite 199
Phoenix, AZ 85016
Jim Huddleston

Jim Huddleston
Director, Information Security and Compliance
PetSmart
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
The Cyber Defense Knowledge Exchange; Hunting Cyber Attacks

September 16, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
920 2nd Avenue South
Minneapolis, MN 55402
Dave Summitt

Eng-Wee Ethan Yeo
Manager, Information Security Governance
Surescripts LLC

Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

September 15, 2015
5:30pm - 8:30pm
Fleming's Prime Steakhouse
4322 W Boy Scout Blvd
Tampa, FL 33607
Dave Summitt

Dave Summitt
Director of Information Security
Moffitt Cancer Center

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
Preventing Data Breaches in an Age of Advanced Cyber Attacks

September 10, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
788 W. Sam Houston Parkway North
Houston, TX 77024
Russell Stalters

Russell Stalters
Director, Information & Data Management
BP

Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

September 10, 2015
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Place
McLean, VA 22102
David Hannigan

David Hannigan
MVP, Security Engineering and Application Security
Capital One

Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Scaling Security Across the Enterprise

September 2, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Dennis Dickstein

Dennis Dickstein
Chief Privacy and Information Security Officer
UBS Wealth Management Americas
Biography

Application security threats continue to evolve at a rapid pace. At the same time, the size of the standard enterprise has also grown, extending beyond traditional borders and storage methods, leveraging different frameworks such as cloud, mobile, web and embedded devices. While this expansion allows for greater connectivity and the potential for further growth, it also opens up new avenues of attack. As the size and scope of the applications expand, your security application model and protocols must be scaled to ensure applications remain secure and protected against potential threats. Join our conversation to learn how you can proactively build security into the earliest stages of your software development lifecycle, enhance your application security program and scale security across your organization and to third party companies.

ISE® PRIVATE DINNER
Applying Threat Intelligence to Enhance Cyber Security

September 1, 2015
5:30pm - 8:30pm
The Palm
One International Place
Boston, MA 02110
David Billeter

David Billeter
Vice President, Global Security, Privacy and Regulatory Compliance
Staples
Biography

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® PRIVATE DINNER
Content as the New Perimeter: Protecting Data on and off the Network

August 27, 2015
5:30pm - 8:30pm
Fleming's Prime Steakhouse
25 East Ohio Street
Chicago, IL 60611
Bruce Coffing

Bruce Coffing
Senior Vice President - Global Information Security
Bank of America

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. While a number of digital rights management tools are available for use, factors like complexity, costly infrastructure requirements and rigid functionality can impede your company’s ability to conduct business. Join our conversation to discuss the challenges of securing fluid information and discover how information management tools can enable your team to better secure, monitor, and control the content that exists within and outside your network.

ISE® PRIVATE DINNER
Effectiveness of Information Protection Technologies to Drive Operational Security Efficiency

August 26, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
3400 W Olive Ave.
Burbank, CA 91505
Michael Dierickx

Michael Dierickx
Information Security Officer
Panasonic Avionics
Biography

The reality of today’s threat landscape is that no single product or service can solve every problem. The principals of multi-layered security architecture, integrating people, processes and technology is more important today, than it has ever been in the past. As organizations strive to find the right balance while under the pressure of shifting budgetary control, there is a light at the end of the tunnel. By adopting best practices, developing operational processes, and fine tuning those procedures, you can drive increases in your operational security model. Join our conversation to discover how to reduce ongoing expenditures by enabling the successful adoption of InfoSec controls, operated by educated staff and integrated into your organizations operational processes.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 25, 2015
5:30pm - 8:30pm
Elway’s Downtown
1881 Curtis Street
Denver, CO 80202
General

Matt Shufeldt
VP & CISO
Sports Authority

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® West Executive Forum and Awards 2015

The ISE® West Executive Forum and Awards 2015 will be held on August 20, 2015 in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® WEST PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

August 19, 2015
5:30pm - 8:30pm
Morton's Steakhouse
400 Post Street
San Francisco, CA 94102

Jeff Trudeau
Information Security Officer
Sutter Health
ISE® West Project Award Winner 2013
ISE® North America Health Care Executive Award Winner 2013
ISE® Success Story

Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security

August 18, 2015
5:30pm - 8:30pm
The Capital Grille
4740 Jefferson St.
Kansas City, MO 64112

Don Ainslie
Vice President, Security, Privacy and Risk
DST Systems

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

August 13, 2015
5:30pm - 8:30pm
The Palm Restaurant
1750 Tyson's Boulevard
McLean, VA 22102
Joseph Lee

Joseph Lee
Chief Information Security Officer
Georgetown University
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 12, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Christopher Hudel

Christopher Hudel
CISO
SPX Corporation
Biography

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise

August 11, 2015
5:30pm - 8:30pm
Donovan’s Steak and Chop House
3101 East Camelback Road
Phoenix, Arizona 85016
Sean Azhadi

Sean Azhadi
Vice President & Chief Technology Officer
Arizona State Savings & Credit Union
Biography

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® VIP RECEPTION
Cyber Defense Knowledge Exchange: Adopting an Adversarial Mindset

August 6, 2015
7:00pm - 10:00pm
The Cosmopolitan of Las Vegas
Chandelier Room
3708 Las Vegas Boulevard South
Las Vegas, NV 89109
Details
 

As security professionals, you don’t just collect intelligence—you analyze it, understand it, share it, and generate more. You use this intelligence to stay ahead in a rapidly changing cyberthreat landscape where you face persistent, unrelenting adversaries—both inside and outside your organizations. Intelligence drives your defense strategy and empowers your team to adopt an adversarial mindset to hunt down and eliminate cyber-attacks in real-time. Join our ISE® Alumni Hosts and program sponsors Cybereason and Lockheed Martin for an engaging reception and the opportunity to share your experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future. If you are interested in registering for this event, please contact Deb Jones.

The ISE® Lions' Den and Jungle Lounge

August 5, 2015
3:00 pm - 6:30 pm
Vdara Hotel & Spa at Aria Las Vegas
Details

This summer TEN of security’s hottest emerging security companies have the courage to enter… The ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. Inside the den, each Gazelle will deliver their best pitch for the chance to earn the top award of more than $30,000 in prizes. Running concurrently, the Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with a diverse group of security executives, investors and other key members of the information security community.

ISE® PRIVATE DINNER
Agile Security: Building A Faster, Stronger, More Responsive Model

August 4, 2015
5:30pm - 8:30pm
Bouchon Bistro at The Venetian Resort & Casino
3355 Las Vegas Boulevard South
Venezia Tower, 10th Floor
Las Vegas, NV 89109
David Cass

David Cass
SVP & Chief Information Security Officer
Elsevier
ISE® Northeast People's Choice Award Winner 2013
Biography

Enterprises continue to invest heavily in virtual and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of cloud benefits, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to develop a more agile, efficient and effective security infrastructure to enable your enterprise to fully capitalize on the many benefits of Infrastructure-as-a-Service (IaaS). If you are interested in registering for this event, please contact Deb Jones and Katie Kroessig.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 30, 2015
5:30pm - 8:30pm
The Capital Grille
301 5th Avenue
Pittsburgh, PA 15222
Frank Donahoe

Franklin Donahoe
Chief Information Security Officer
Mylan
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 29, 2015
5:30pm - 8:30pm
Morton’s The Steakhouse
1511 6th Ave
Seattle, WA 98101
Bill Boni

Bill Boni
Vice President and Corporate Information Security Officer
T-Mobile USA
ISE® North America Commercial Executive Award Finalist 2007
ISE® Central Executive Award Winner 2007

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Modernize Your Enterprise: Orchestrating a Secure, Heterogeneous Network

July 28, 2015
5:30pm - 8:30pm
The Capital Grille
500 Crescent Ct.
Dallas, TX 75201
General

Adam Maslow
Director, Security and Compliance
JCPenney

Networks have become progressively more complex and require constant transformation as new threats emerge. With network environments in a state of flux, security teams need to address continuing modernization and business operation’s needs, such as supporting applications teams, migrating data centers, troubleshooting connectivity problems and preparing for audits. In addition to that, many organizations have begun the process of implementing plans for IT transformation initiatives, including virtualization and cloud computing. Even for well-trained and seasoned security teams, adding these processes – in addition to the already time consuming efforts of network monitoring and information security – can become a daunting task. Join our conversation to learn how to modernize your enterprise through tight security posture, rapid service delivery and regulatory compliance across all platforms.

ISE® PRIVATE DINNER
The Cost of a Cyberattack: Best Practices for Defending Your Enterprise - SOLD OUT

July 21, 2015
5:30pm - 8:30pm
The Capital Grille
94 Perimeter Center West
Dunwoody, GA 30346
Carlos Batista

Carlos Batista
Group Vice President, Security Operations & Intelligence
SunTrust Banks
Biography

According to a recent study by the Ponemon Institute, those surveyed reported an average of $1.5 million in costs to- DDoS attacks over the last 12 months. Outside of fiscal losses, web application and distributed denial of service attacks can land crippling blows to productivity and brand reputation. Attack methods continue to evolve, and so must the tools and methods we use to combat them. Obtaining clearer, continuous visibility is imperative for network and web security professionals and their teams to successfully identify and mitigate attacks. Join our conversation to learn more about how your team can improve current monitoring methods and mitigation strategies via network layer defense options and critical application layer defenses.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

July 16, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
7550 High Cross Blvd.
Columbus, OH 43235
Julie Lucas

Julie Lucas
VP, IT Security
The Huntington National Bank
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER : The Evolving Challenge of Third Party Security Risk Management

July 15, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
25 East Ohio Street
Chicago, IL 60611
Larry Lidz

E. Larry Lidz
Assistant Vice President, Information Security
CNA Insurance
Biography

Industry experts estimate that third-party security breaches are growing at an astounding rate, leading many to believe that a firm’s level of cybersecurity is only as good as the security of its vendors. To be successful, CISOs must work with, not against, partners to effectively remediate immediate threats and lower collective security risk. Join our conversation to discuss how to better protect your organization from third party threats by adding continuous monitoring to your arsenal and adopting practices for collaborative intervention and remediation.

ISE® PRIVATE DINNER : Applying Threat Intelligence to Enhance Cyber Security

July 14, 2015
5:30pm - 8:30pm
Mastro’s Steakhouse
8852 East Pinnacle Peak Road
Scottsdale, AZ 85255
Jerry Dixon

Jerry Dixon
Vice President, Security Incident Response
American Express

Your team is inundated with data from security devices, sensors, applications and remote feeds, and can easily become numb to what the data is communicating. How can you separate the noise from valuable, actionable data? Most importantly, how can this be applied to defense strategies so your team does not overlook critical warnings signs of a compromise before an incident occurs? A successful cyber security strategy leverages threat intelligence to proactively anticipate attacks, helping set countermeasures and identifying indicators of compromise. Join our conversation to discover how threat intelligence can become a valuable resource when applied with automation, in turn providing rich context to threats and better visibility without burdening security teams with complexity.

SOFTWARE SECURITY ASSURANCE SUMMIT

June 30, 2015
2:00pm - 6:00pm
THE WESTIN SOUTH COAST PLAZA
686 Anton Boulevard
Costa Mesa, CA 92626
Mark Graff

Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography

SOFTWARE SECURITY ASSURANCE SUMMIT

June 23, 2015
2:00pm - 6:00pm
SHERATON SUNNYVALE
1100 North Mathilda Avenue
Sunnyvale, CA 94089
Registration
Details
Mark Graff

Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography

SOFTWARE SECURITY ASSURANCE SUMMIT

June 18, 2015
2:00pm - 6:00pm
THE WESTIN BUCKHEAD ATLANTA
3391 Peachtree Road NE
Atlanta, GA 30326
Mark Graff

Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography

SOFTWARE SECURITY ASSURANCE SUMMIT

June 16, 2015
2:00pm - 6:00pm
THE WESTIN TIMES SQUARE
270 West 43rd Street
New York, NY 10036
Registration
Details
Mark Graff

Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography

SOFTWARE SECURITY ASSURANCE SUMMIT

June 4, 2015
2:00pm - 6:00pm
SHERATON CENTRE TORONTO HOTEL
123 QUEEN STREET WEST
TORONTO, ON M5H 2M5
Details
Mark Graff

Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography

ISE® PRIVATE DINNER
Secrets to Securing the Dynamic, Complex Enterprise Environment

June 3, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
260 S Broad Street
Philadelphia, PA 19102
Cathy Rees

Cathy Rees
VP, Information Security
Comcast Corporation
Biography

As they grow and become more dynamic, enterprise environments become increasingly complex, making it difficult for businesses to understand and control the risks presented by their web-facing assets such as web applications, mobile applications and network infrastructure. Historically, this problem has been compounded by vulnerability discovery solutions that breed a culture of compliance and fail to accurately portray an adversary’s view of the environment. A new approach is needed to align actual and perceived risks to business operations, revenue, and reputation. Join our conversation to explore how continuous assessment, scalability, visibility and control are key to securing your complex enterprise network and ensuring success for your business.

SOFTWARE SECURITY ASSURANCE SUMMIT

June 2, 2015
2:00pm - 6:00pm
THE RITZ-CARLTON TYSONS CORNER
1700 Tysons Boulevard 
McLean, VA 22102
Details
Mark Graff

Mark Graff
Founder and CEO
Tellagraff
New York, NY
ISE® Northeast Executive of the Year Award Winner 2014
Biography

ISE® PRIVATE DINNER
Know Thy Enemy: Using Intruder Analytics to Detect Compromised Users

May 19, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036

Jose Alvir
Senior Director
Pfizer, Inc.
Biography

Time is not an abundant resource when an intruder is in your network, yet speed is a necessity when identifying and addressing incidents involving compromised users. Your team must be able to quickly and efficiently detect incidents, investigate their credibility and respond immediately to disrupt the attack before damage is done. Think minutes – not hours – as response time is one of the most substantial factors that will influence the impact and loss caused by a breach. The use of intruder analytics and can arm your team with knowledge of attacks and intruder behavior to more rapidly identify malicious actors and initiate mitigation. Join our conversation to learn more about incorporating intruder analytics into your cyber security program and discover best practices for detecting and addressing compromised user based attacks.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

May 14, 2015
5:30pm - 8:30pm
Hyde Park Prime Steakhouse
569 North High Street
Columbus, Ohio 43215

Carla Donev
Director, IT Risk Management
Cardinal Health, Inc.
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

May 13, 2015
5:30pm - 8:30pm
The Capital Grille
2502 East Camelback Road
Phoenix, AZ 85016
Jason Lish

Jason Lish
Vice President of Security Technology & Operations
Charles Schwab & Company
Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

May 13, 2015
5:30pm - 8:30pm
The Chicago Chop House
60 W.Ontario St.
Chicago, IL 60654

Brian Klement
Former Managing Director of Information Security
NYSE Euronext
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® Central Executive Forum and Awards 2015

The ISE® Central Executive Forum and Awards 2015 will be held on May 7, 2015 at the Sheraton Downtown in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® CENTRAL PRIVATE WELCOME DINNER
Securing the Endpoint in an Age of Advanced Cyber Attacks

May 6, 2015
5:30pm - 8:30pm
Dallas Fish Market
1501 Main St.
Dallas, TX 75201
Registration
Ajay Gupta

Ajay Gupta
Chief Information Security Officer
Concentra
Biography

Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

ISE® PRIVATE DINNER
Governance, Compliance & Collaboration: Succeeding in a Complex Market

April 30, 2015
5:30pm - 8:30pm
Trump International Hotel & Tower Toronto
Bay Street Room, 30th Floor
325 Bay Street
Toronto, ON M5H 4G3

Michael Bentley
IT Risk Management Director
Royal Bank of Canada
Biography

The compliance and technology landscape has changed dramatically since 2008 for systematically important financial institutions (SIFIs). Regulators are increasing scrutiny and fines (SEC OCIE and FRB BS&R) and internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. From simple document sharing to surveillance and monitoring, corporations struggle to maintain efficiency without compromising security and control. Join us for a discussion with your peers to address the biggest challenges your organization is facing. We’ll address these challenges and discuss best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.

ISE® PRIVATE DINNER
Fueling a Collaborative Environment to Securely Share Your Mission-Critical Information

April 30, 2015
5:30pm - 8:30pm
Morton’s The Steakhouse
1001 McKinney Street
Houston, TX 77002

In today’s threat landscape, the high frequency of unauthorized intrusions drive an ever-increasing need to maintain security, access and control of mission-critical information. From simple sharing of proprietary documents to surveillance and monitoring, corporations struggle to maintain efficiency without creating unnecessary risk. The need to collaborate securely across international boundaries creates additional challenges for your business. Join us for a conversation with your peers to address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment.

ISE® VIP Programs at RSA 2015

Once again, T.E.N. via the ISE® VIP Programs will proudly be at the RSA® Conference 2015 with opportunities for you to meet with your executive peers from a cross-section of industries from across the country. Hosted by ISE® Alumni and sponsored by leading security solution providers, the ISE® VIP Programs are exclusive invitation-only programs that offer a unique opportunity to connect, collaborate and celebrate with leading IT and Information Security Executives® throughout the RSA® Conference 2015.

ISE® VIP Programs include a special breakfast, luminary luncheons, and exclusive VIP receptions in evenings. As our ISE® VIP Programs have been oversubscribed in previous years due to limited availability, we recommend that you register for these programs early. Details

Tenable Executive Retreat Napa 2015

April 17-19, 2015
The Carneros Inn
4048 Sonoma Hwy
Napa, CA 94559
Details

Tenable's top customers are invited for a weekend in beautiful Napa Valley where they will interact with leading industry and policy experts to discuss key security issues. In a relaxed setting, we will follow an organized agenda focused on moving beyond discussions of 'information sharing' in order to strengthen the security industry as a whole.

As we enter 2015, one of the great and vexing ironies is that as IT infrastructure has taken center stage in both business and government, IT has also ‘left the building’, dispersed to locations mobile, virtual, social, and cloud, operated by third parties – as if protecting it wasn’t already difficult enough.

Speakers and panelists will engage with 50 Tenable customer CSOs to discuss how government, enterprises, their boards of directors, executive management and technologists are responding, where there are successes, and where help is needed.

ISE® PRIVATE DINNER: The Cyber Defense Knowledge Exchange

April 15, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th Street
New York, NY 10036
Dr. Yonesy F. Nuñez

Dr. Yonesy F. Nuñez
SVP, Information Security Leader - International
Wells Fargo
Biography

Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.

ISE® PRIVATE DINNER:
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management

April 14, 2015
5:30pm - 8:30pm
Smith & Wollensky
4145 The Strand
Columbus, OH 43219
Julie Talbot-Hubbard

Julie Talbot-Hubbard
Assistant Vice President Information Technology Engineering
Nationwide Mutual Insurance Company
ISE® Central Executive Award Winner 2010
T.E.N. Success Story

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe

ISE® PRIVATE DINNER: The Cyber Defense Knowledge Exchange

April 1, 2015
6:30pm - 9:00pm
Omni Riverfront Hotel New Orleans
Rex Room, 1st Floor
701 Convention Center Blvd
New Orleans, LA 70130
Robert Mims

Robert Mims
Chief Information Security Officer
AGL Resources
Atlanta, GA
ISE® Southeast People's Choice Award Winner 2014
Biography

This event is being hosted in conjunction with the AGA Conference, therefore participation is limited to security executives and professionals in the gas/energy/utilities industries. Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.

ISE® PRIVATE DINNER
It's Time for a Wake-up Call: Re-thinking Security

March 31, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
1511 6th Avenue
Seattle, WA 98101
Dave Estlick

Dave Estlick
VP, Technology Infrastructure & Enterprise Security
Starbucks Coffee Company
Biography

There are two kinds of organizations: Those who've been hacked and know it, and those who've been hacked and don't know it. The sophistication and speed of attacks require new, innovative approaches as methodologies and tools from a decade ago are no longer sufficient to confront the continually evolving threat landscape. The security industry needs a wake-up call and the conversation must change at the executive management and board levels. Join our conversation to take a deep dive into why attacks persist, discuss how the security paradigm is shifting from a defensive stance to a proactive, offensive approach, and learn how innovative technologies can enable detection and remediation with unprecedented levels of speed and scale — from seconds to minutes vs. days to weeks.

ISE® PRIVATE DINNER
Don’t Be the Next Victim: Strategies for Preventing and Mitigating Advanced Threats

March 25, 2015
5:30pm - 8:30pm
Morton's The Steakhouse
400 East Flamingo Road
Las Vegas, NV 89169
Bill Worthington

William Worthington
Chief Information Security Officer
Caesars Entertainment
Las Vegas, NV
ISE® West Executive Award Finalist 2014
Biography

DDoS attacks continue to increase in frequency and evolve in sophistication and complexity, often making national news and wreaking havoc on the enterprise. Victims claim DDoS attacks cause an estimated $27 million in damages for a 24-hour outage along with interrupted business operations, lost revenue, customer defection and damage to the brand. In order to successfully protect the enterprise, your security strategy must involve preventative and defensive measures that rely on access to comprehensive, accurate and current malware data and continuous visibility across your network. Join our conversation to discuss your existing approach to preventing and mitigating advanced threats and learn new strategies for ensuring your enterprise does not become the next victim.

ISE® PRIVATE DINNER: The Cyber Defense Knowledge Exchange

March 24, 2015
5:30pm - 8:30pm
Del Frisco’s Double Eagle Steak House
5061 Westheimer Rd Suite 8060
Houston, TX 77056
Rich Jackson

Rich Jackson
Retired Senior Advisor to the CIO for Cyber Security
Chevron Corporation
ISE® Luminary Leadership Award Winner 2011
ISE® North America Executive Award Finalist 2006

Biography

Critical systems and networks come under attack every day, yet you continue to safeguard your most sensitive information and mission-critical systems with advanced solutions and intelligent driven defense. An effective security program is always evolving and there is no better way to strengthen your approach than to glean best practices from the wisdom of others in the industry. Join our conversation to share your personal experiences and exchange cyber defense strategies with industry thought leaders in order to build a stronger, more effective security program for the future.

ISE® PRIVATE DINNER
Mitigating Data Risk: Safeguard Data While Enabling Business

March 24, 2015
5:30pm - 8:30pm
The Capital Grille
44 Front Street
Hartford, CT 06103
Jim Routh

Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
ISE® Northeast Executive Award Finalist 2014
ISE® North America Executive Award Winner 2014 - Health Care Category

Biography

Recent trends show that identity breach and data loss are the leading cause and effect of mega breaches. In addition to employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management and encryption solutions alone as ineffective security measures. How can you ensure that employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how next generation data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.

ISE® PRIVATE DINNER
Bracing for Impact: Cyber Security Legislation and Collaboration

March 12, 2015
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036

Joseph Kinslow
Group Information Security Officer (GISO), SVP, Retail Services Cards Business
Citigroup Inc.
Biography

In his recent State of the Union address, President Obama urged Congress to finally pass legislation needed to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children’s information. In the weeks leading up to this address, the president rolled out several initiatives, including to establish a national standard for companies to inform consumers of a data breach within 30 days of discovery. He also released an updated proposal to improve information-sharing across industry and government around cyber threats. When passed into law, these new changes could have a substantial impact on corporate collaboration, compliance and reporting – how are you readying your organization for the impact? Join our conversation to take a deep dive into the potential cyber security legislation and learn how your peers are preparing for the potential changes the new requirements may bring.

ISE® Southeast Executive Forum and Awards 2015

The ISE® Southeast Executive Forum and Awards 2015 will be held on March 4, 2015 at the Westin Buckhead Hotel in Atlanta, GA. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Don’t Be the Next Victim: Strategies for Preventing and Mitigating Advanced Threats

February 19, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
1700 N. West Shore Blvd.
Tampa, FL 33607
John Graham

John Graham
Chief Information Security Officer
Jabil
ISE® Southeast Executive Award Finalist 2012
Biography

DDoS attacks continue to increase in frequency and evolve in sophistication and complexity, often making national news and wreaking havoc on the enterprise. Victims claim DDoS attacks cause an estimated $27 million in damages for a 24-hour outage along with interrupted business operations, lost revenue, customer defection and damage to the brand. In order to successfully protect the enterprise, your security strategy must involve preventative and defensive measures that rely on access to comprehensive, accurate and current malware data and continuous visibility across your network. Join our conversation to discuss your existing approach to preventing and mitigating advanced threats and learn new strategies for ensuring your enterprise does not become the next victim.

ISE® PRIVATE DINNER
Don’t Be the Next Victim: Strategies for Preventing and Mitigating Advanced Threats

February 10, 2015
5:30pm - 8:30pm
Ruth’s Chris Steak House
431 N. Dearborn Street
Chicago, IL 60654
Todd Fitzgerald

Todd Fitzgerald
Global Director of Information Security
Grant Thornton International, Ltd
2005 ISE® Central Finalist
2006 ISE® Central MC & Judge
2008 ISE® West MC
2012 ISE® North America MC
Security Author

Biography

DDoS attacks continue to increase in frequency and evolve in sophistication and complexity, often making national news and wreaking havoc on the enterprise. Victims claim DDoS attacks cause an estimated $27 million in damages for a 24-hour outage along with interrupted business operations, lost revenue, customer defection and damage to the brand. In order to successfully protect the enterprise, your security strategy must involve preventative and defensive measures that rely on access to comprehensive, accurate and current malware data and continuous visibility across your network. Join our conversation to discuss your existing approach to preventing and mitigating advanced threats and learn new strategies for ensuring your enterprise does not become the next victim.

ISE® PRIVATE DINNER
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management

February 5, 2015
5:30pm - 8:30pm
The Palm Restaurant,Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta GA, 30326

Michael Wilcox
Director of Global IT Security
Newell Rubbermaid
Biography

Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

ISE® PRIVATE DINNER
Mitigating Insider Threats: Safeguard Data While Enabling Business

January 22, 2015
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
1960 Chain Bridge Road
McLean, VA 22102
name

Stacey Halota
Vice President, Information Security and Privacy
Graham Holdings
ISE® Mid-Atlantic Commercial Executive Award Winner 2009
Biography

Recent reports indicate that insider threats have outpaced all others as the leading cause of mega breaches. In addition to innocuous employee mistakes and lost devices, hackers are becoming increasingly skilled at capturing credentials of privileged users, which renders the use of access management solutions alone ineffective as a security measure. How can you ensure employees have access to the data they need to complete key processes and core business functions, while safeguarding your sensitive information? Join our conversation to learn how data masking can enable data sharing and ensure database and application integrity, without putting your organization and your important data at risk.