Archived Events 2019

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

January 22, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 W Olive St., Suite 180
Burbank, CA 91505
David Alexander

David Alexander
Chief Information Security Officer
Los Angeles Department of Water and Power
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

January 17, 2019
5:30pm - 8:30pm
Eddie V's Prime Seafood
4023 Oak Lawn Ave.
Dallas, TX 75219
Eric Fisch

Eric Fisch
Executive Vice President and Information Security Officer
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

Atlanta Girls’ School Winterim 2019
Following Your Passion to Chart a Successful Path in Tech

January 15, 2019
12:00pm - 3:00 pm (2 sessions)
Atlanta Girls’ School
3254 Northside Parkway NW
Atlanta, GA 30327
More Information
Guest Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

While women constitute a minority within the technology industry, we are now seeing improvements at drawing them into the field. For instance, the 2018 (ISC)2 Cybersecurity Workforce Study reports that women now represent 24% of the cybersecurity workforce, compared to past reports of 11%. Additionally, Millennial and Gen Y representation has increased to 35% from less than 20%. Though we’re progressing in making STEAM fields more accessible to women and young people, we still have a long way to go in dismantling the FUD and stereotypes that accompany these industries. The truth is, there’s more to technology than just programming and coding. Employers in these industries desire candidates with skillsets like marketing and business as well as soft skills like teamwork and collaboration—you can even be an entrepreneur! In other words, being tech-savvy isn’t the only path into a tech field; there are, in fact, many paths you can take and various avenues for you to get there. Join Marci McCarthy, CEO and President of T.E.N. and member of the AGS Board of Trustees, as she discusses how women can find success and a future within the tech industry by following their passions, even if said passion isn’t technical in nature.

ISSA Chicago Chapter Meeting
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

January 10, 2019
3:00pm - 5:00 pm
Carlucci Rosemont
6111 North River Road
Rosemont, IL 60018 US
More Information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

January 8, 2019
5:30pm - 8:30pm
The Palm
The Westin Buckhead Atlanta
3391 Peachtree Rd NE
Atlanta, GA 30326

Lonnie Benavides
Vice President, Head of Active Defense
Information, Security & Risk Management
McKesson
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.