Archived Events 2020

ISE® COCKTAILS AND CONVERSATIONS
How Much Trust Can You Put in Your Devices? A Conversation for the Financial Industry

August 13, 2020
5:30 PM – 6:45 PM ET
Northeast Region: Financial Industry

ISE® VIP Hosts:

Susan Koski

Susan Koski
Divisional CISO/ Senior Vice President, Cyber Security Strategy and Operations/Fraud Operations and Investigations
PNC

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

The new remote work environment has created new challenges for financial institutions with profound impacts on organizational security models. Users are no longer protected by the many layers of security found on-premise in the corporate network. Financial organizations must adapt security policies to support a massive influx of inbound connections. Security teams must consider how to adapt core security concepts like Zero Trust to encompass remote work environments that include corporate laptops, BYOD devices, and home networking gear. If the integrity of these devices isn’t assured, then it is impossible to assure the safety of the operating systems and other software running on them. However, for many organizations, device integrity remains a blind spot where Zero Trust principles are not yet applied, and as a result, security is assumed instead of verified. Join our conversation as we discuss how much trust you can put in your devices as well as what financial institutions are doing to assess and verify device integrity.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® SALES AND MARKETING FIRESIDE WEBINAR: Turning Digital Outreach Into Real Relationships: Sales and Marketing Techniques Amidst Pandemic Fatigue

August 13, 2020
2:00 PM - 3:15 PM ET
11:00 AM – 12:15 PM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Dave Estlick

Dave Estlick
CISO
Chipotle Mexican Grill

Craig  Froelich

Joey Johnson
CISO
Premise Health
ISE® Southeast Executive of the Year Award Winner 2017
ISE® North America Executive: Health Care Award Finalist 2017

Biography

Kevin McKenzie

Dr. Kevin McKenzie
VP & CISO
Dollar Tree Stores
ISE® Southeast Executive Award Winner 2013
ISE® North America Academic Executive Award Winner 2013

Biography

Jim Routh

Jim Routh
CISO
MassMutual
ISE® Northeast Executive Award Winner 2007
ISE® North America Executive Award Winner 2014 - Health Care Category
ISE® Northeast Executive Award Finalist 2014
ISE® Luminary Leadership Award Winner 2016

Biography

Sales and marketing teams are facing extraordinary challenges in connecting with cybersecurity professionals and engaging with them in a significant capacity. In fact, most professionals are fatigued due to the pandemic and working from home in general, becoming desensitized from the influx of emails both are causing. What was once a reliable method of communication between vendors and security professionals is now dreaded, and without office phones to call, vendors are unable to determine the best time to contact potential customers and how. Cellphones are not always acceptable, and security members are having to divide their time even more between professional and personal obligations. Even digital events have become too numerous, and both vendors and security members must carefully vet which ones will provide true value to participate in. How, then, can vendors engage in effective digital outreach with customers that will transform into real, enriching business relationships for them both? Join our conversation as we discuss with security leaders what sales and marketing techniques will be crucial for vendors to employ now, so security teams can make the best investment decisions and prepare for the coming months.

ISE® COCKTAILS AND CONVERSATIONS
Stop Buying Security Products: Improve Your Security Posture Using What You Have, Better

August 12, 2020
5:30 PM – 6:45 PM CT
North & South Central Region: Alabama, Arkansas, Illinois, Iowa, Kansas, Kentucky, Louisiana, Minnesota, Mississippi, Missouri, Nebraska, North Dakota, Oklahoma, South Dakota, Tennessee, Texas, Wisconsin

ISE® VIP Hosts:

Alan Berry

Alan Berry
VP, Cybersecurity
Centene Corporation
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

The past few months have introduced new challenges for security professionals to face as budgets were significantly changed, and short-staffed, overworked teams defend against influxes of known and zero-day attacks. To make up the difference, enterprise leaders often believe they need to implement more security tools and technology. The reality is this: 99% of breaches come from known attacks—not zero days—and 97% of breaches are happening to companies that already have deployed the right controls. Instead, security teams should consider re-optimizing their current security stack by ensuring their technology has been configured correctly while continuously testing for drift over time. No amount of security controls will matter if your security products don’t work as intended—so do you really need to buy yet another product? Join our conversation as we discuss how to do more with less by optimizing your current technology, applying actionable security metrics via frameworks like MITRE and performing a pragmatic approach to risk-based vulnerability management and prioritization.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: The Role of the CISO in Compliance: The Good, the Bad, and the Ugly

August 12, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
View Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Leach_Chris

Chris Leach
Senior CISO Advisor
Cisco
Biography

Marc Varner

Marc Varner
Corporate VP and Global CISO
Yum! Brands

No matter the type of audit or regulation, there is always a cybersecurity component that accompanies it. In fact, CISOs often find themselves involved in the process, as auditors tend to ask for the same kinds of security information regardless if the business follows PCI, HIPAA, or another type of compliance. Whether it’s information about firewalls, perimeters or other security measures, CISOs and other security executives face constant churn with gathering and delivering that information for each separate audit—to the point where it has become a full-time job by itself. While automation seems to be an obvious answer to the problem, there are not many tools built specifically for handling compliance. Instead, security professionals often turn back to employing spreadsheets, since automation tools require constant care and feeding, resulting in a cumbersome experience. The tension of handling compliance only grows when you consider how privacy has surged to the forefront of concerns, along with IT and security. Join our conversation as we discuss how security executives are managing compliance now and what new strategies they are considering for how to conduct it more effectively in the future.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

July 30, 2020
5:30pm - 8:30pm
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

ISE® COCKTAILS AND CONVERSATIONS
Yesterday’s Solutions Won’t Solve Tomorrow’s Data Security Issues: Filling the Gap on Current DLP/CASB Security Solutions

July 29, 2020
5:30-6:45pm ET
4:30-5:45pm CT

EAST COAST & CENTRAL REGION
Industries: Technology, Business Services, Manufacturing, Energy and Utilities, Pharmaceuticals and Biotech

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Jim Nelms

Jim Nelms
Chief Information Security Officer
LabCorp

As businesses push to digitally transform and empower employees, collaboration technologies and cloud applications have become more advanced. While these improvements allow users to be more mobile and make data increasingly portable, they also move data far beyond the traditional security boundaries. Many companies struggle to keep up with effective data security and protection amid such advances. Traditional data classification-based policies and blocking approaches are protecting less data than ever before—especially user data, which includes many files that employees are working with daily on their computers, in cloud applications and in collaboration tools. To solve future security issues, we will need new solutions that consider both user- and data-centric approaches. Join our conversation as we discuss the shortcomings and underutilization of current DLP/CASB solutions as well as how companies can invest on improvements that assist with threat intelligence and incident detection, investigation and response.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Secure Collaboration Begins with Secure Email

July 29, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Chuck Deaton

Chuck Deaton
Chief Information Security Officer
Humana Edge

Nick Stamos

Nick Stamos
CEO & Founder
e-Share
Biography

Patrick Sullivan

Patrick Sullivan
Head of Security Operations
Refinitiv

Existing secure email solutions have been relegated to a compliance-only role, seldom used to protect proprietary information, and never used to initiate a collaboration with a partner, supplier, or other outside party. The culprits are principally a poor user experience, especially for recipients; no ability to provide controls over attachments; and no content collaboration features of any kind. Fortunately, new approaches to secure mail address these limitations, incorporating file sharing and collaboration features that leverage your existing cloud file storage and sharing solutions, such as OneDrive, SharePoint and Box. Join our conversation as we discuss how the role of secure email can be extended to cover external file sharing and content collaboration use cases—with an ease-of-use that both senders and recipients will welcome.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Head in the Clouds: Don’t Forget About Cybersecurity

July 23, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Amit Bhardwaj

Amit Bhardwaj
CISO
Lumentum
Biography

Chris Ray

Chris Ray
CISO
TriNet
ISE® Southeast Executive Award Winner 2011
T.E.N. Success Story

Ed Yousfi

Ed Yousfi
Director, IT Security (CISO)
Gallagher Bassett Services
Biography

Many enterprises had already transitioned their data centers into the cloud and other heavily virtualized environments before the pandemic. However, the sudden shift to remote environments has caused more companies and employees than ever to utilize cloud tools and applications in order to manage workflows from home. Since many of these changes happened overnight, it’s inevitable that enterprises overlooked applying proper cybersecurity controls in favor of keeping the lights on. In addition, security teams cannot use on-prem security measures to secure remote, cloud environments, and older practices—such as implementing choke points to force data flows through a select set of avenues—simply don’t work anymore. In this new remote world, how will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss the challenges of maintaining cybersecurity during cloud migration along with best practices for how a comprehensive cloud platform can synchronize your enterprise teams no matter where they work.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Eliminating Security Blind Spots Across AWS, Azure, and GCP

July 21, 2020
1:45 PM – 2:30 PM ET
10:45 AM – 11:30 AMPT
Watch Video On Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Robert Allen

Robert Allen
Global Chief Information Security Officer
Gallagher

Al Ghous

Al Ghous
Vice President, Chief Security Officer
ServiceMax
Biography

Avi Shua

Avi Shua
CEO
Orca Security
Biography

As organizations of all sizes and industries continue transitioning their infrastructure to the cloud, security professionals are challenged to secure and have visibility into public cloud services like AWS, Azure, and GCP. Gaps in breadth and depth of coverage impose new risks from vulnerabilities, malware, misconfigurations, lateral movement, secret keys, weak and leaked passwords, and unsecured PII. These obstacles make their jobs difficult if not impossible. Thankfully, an outcropping of tools offers visibility and security into cloud behavior but implementing those tools correctly to gain those results is only step one. Security professionals must also use this newfound knowledge while adhering to the reasons the company shifted to the cloud in the first place: to move fast and grow. Join our conversation as we discuss how enterprises can regain workload-level visibility into cloud assets as well as convert this information to actionable security that maintains innovation and performance.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 16, 2020
5:30 PM – 6:45 PM CT
South Central Region: Texas, Oklahoma, Arkansas, Louisiana, Mississippi, Alabama, Tennessee, Kentucky

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Adam Maslow

Adam Maslow
Sr. Director Information Security
Raising Cane's

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 15, 2020
4:30 PM – 5:45 PM MT
5:30 PM – 6:45 PM CT
6:30 PM – 7:45 PM ET
North Central Region: North Dakota, South Dakota, Wisconsin, Minnesota, Nebraska, Iowa, Illinois, Missouri, Kansas

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Shelbi Rombout

Shelbi Rombout
Deputy Chief Information Security Officer
U.S. Bank

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Get off the Treadmill: Simplify Your Security Infrastructure to Reach Operational Efficiency

July 15, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Leach_Chris

Chris Leach
Senior CISO Advisor
Cisco
Biography

Richard Rushing

Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography

Security leaders and their teams are expected to keep pace with more cyber threats than ever before. By pivoting to remote environments overnight, enterprises have encountered new security vulnerabilities and shortcomings that have required immediate mitigation. At the same time, business leaders expect for the lights to stay on, meaning security teams must perform their tasks without negatively impacting operations. Some have turned to adopting a growing list of tools to maintain operational efficiency and make up for talent shortfalls, putting them on an endless treadmill of stitching up incompatible products. Is this truly the right strategy for reducing costs and identifying risks quickly? Security operations might be better served by avoiding further vendor overload to instead have teams optimally utilize the resources they already possess. For instance, if your current security platform cannot display your mean time resolution of threats in minutes instead of hours, there may be something you can do differently to acquire greater operational efficiency. Join our conversation as we discuss how enterprises can simplify their security for a consistent experience that unifies visibility; enables automation; and strengthens your security across networks, endpoints, the cloud and applications.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

July 14, 2020
5:30-6:45pm ET
Northeast Region: Connecticut, Delaware, Indiana, Maine, Maryland, Massachusetts, Michigan, New Hampshire, New Jersey, New York, Ohio, Pennsylvania, Rhode Island, Vermont, Virginia, Washington D.C., and West Virginia

ISE® VIP Hosts:

Medha Bhalodkar

Medha Bhalodkar
CISO, Enterprise IT Risk Officer
Columbia University
ISE® North America Executive Award Winner 2015 - Academic/Public Sector Category
ISE® North America Executive Award Winner 2016 - Academic/Public Sector Category
ISE® Northeast Executive Award Finalist 2018

Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISSA Central Alabama Chapter Meeting
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

July 9, 2020
11:00am - 12:30pm CT
More Information

Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. As the pandemic has shifted most professionals and jobs to a remote work environment, employers will also need to shift how they notice and hire new talent by acknowledging different skills and work experiences. We must also think outside the box in how we inspire and motivate employees unused to working from home or within hybrid environments as these situations become the new normal. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs, digital outreach and other education opportunities.

ISE® COCKTAILS AND CONVERSATIONS
Doing More with Less: Protect Against Today’s Insider and Cyber Threats

July 8, 2020
5:30-6:45pm ET
4:30-5:45pm CT
Southeast Region: Alabama, Florida, Georgia, Kentucky, Maryland, Mississippi, North Carolina, South Carolina, Tennessee, Virginia, West Virginia

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kevin McKenzie

Dr. Kevin McKenzie
VP & CISO
Dollar Tree Stores
ISE® Southeast Executive Award Winner 2013
ISE® North America Academic Executive Award Winner 2013

Biography

In the past few years, the insider threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications has made tracking and protecting sensitive data extremely challenging. Add to this the current remote work setup in the midst of COVID-19, and one can imagine how hard it is to track, monitor and protect your crown jewels. Join our conversation as we discuss the direction our insider programs should pivot towards to protect our organizations against the latest cyber threats, the fallout of data exfiltration and vulnerabilities within cloud tools and applications.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

June 30, 2020
5:30 PM – 6:45 PM PT
Northwest Region: Northern California (San Francisco North), Oregon, Washington, Idaho, Montana, Wyoming, Alaska

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kevin Morrison

Kevin Morrison
Managing Director, Enterprise Information Security and Chief Information Security Officer
Alaska Air Group
ISE® Southeast People’s Choice Award Winner 2015
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Security 2.0: Planning for 2020 and Beyond in a Remote Workforce World

June 30, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Frank Aiello

Frank Aiello
VP, CISO
Maximus
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016

Biography

Cindy Cullen

Cindy Cullen
Global Director Information Security
Interpublic Group
Biography

hanson_jadee

Jadee Hanson
CISO
Code42
Biography

The rulebook changed quite literally in March 2020 when companies across the US went 100% remote. This has reshaped and reset priorities for security, not just for the remainder of 2020 but also permanently. Digital initiatives that started off with 3-year roadmaps have become near to mid-term priorities for organizations as they build plans for an ever-increasing number of remote employees. While these expedited steps have been necessary, they also combine to create ideal conditions for insider threats, making it essential for organizations to revisit overall security strategies. What new challenges will security leaders face, and how are security leaders planning to tackle them? Join our conversation as we discuss the future of security that manages both in-office and remote work environments as well as the evolving role of security teams to include infrastructure planning, supporting higher percentages of digital employee onboarding and offboarding, incident response planning for insider threats, employee training and more.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 25, 2020
5:30 PM - 6:45 PM CT
Texas Region: Austin, TX, Dallas, TX, Houston, TX

ISE® VIP Hosts:

Mike Coogan

Mike Coogan
Senior Director, Cybersecurity
Waste Management
ISE® Central Executive Award Winner Finalist 2015
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 24, 2020
5:30 PM - 6:45 PM PT
West Coast Region: Washington, California

ISE® VIP Hosts:

Kirkland_Andy

Andy Kirkland
CISO
Starbucks
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Minding the Gap: What Is Missing From Our Security Technology Stack?

June 24, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Leach_Chris

Chris Leach
Senior CISO Advisor
Cisco
Biography

Anahi Santiago
Chief Information Security Officer
Christiana Care Corporation
Biography

According to the World Economic Forum, business leaders regard cyberattacks as the top risk behind fiscal crises in advanced economics, making it imperative for CISOs and their teams to identify areas where greater protection is needed. Even before the pandemic, security and business leaders have experienced friction and shortcomings from their security technology stack, lacking capabilities in areas like automation, data management, incident response and others. Some struggle with overcomplicated stacks, where tools do not integrate well with each other and obscure visibility into vulnerabilities, while others have technology that simply does not cover all their security needs. With the nation-wide pivot towards remote work, security teams have discovered new vulnerabilities that either went unnoticed or unencountered before. Previously under-defended devices, work-from-home employees and niche areas like telehealth now comprise much bigger considerations as we search for gaps in our security stack. Join our conversation as we discuss best practices for identifying security vulnerabilities caused by your own technology and determining which tools and processes are needed for the future.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Stop Buying Security Products: Improve Your Security Posture Using What You Have, Better

June 23, 2020
5:30 PM - 6:45 PM ET
Northeast Region: Connecticut, Delaware, Maine, Massachusetts, Maryland, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, Vermont, Washington D.C.

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

OKeefe_John

John O’Keefe
CISO, Infrastructure & Operations AVP
GEICO

The past few months have introduced new challenges for security professionals to face as budgets were significantly changed, and short-staffed, overworked teams defend against influxes of known and zero-day attacks. To make up the difference, enterprise leaders often believe they need to implement more security tools and technology. The reality is this: 99% of breaches come from known attacks—not zero days—and 97% of breaches are happening to companies that already have deployed the right controls. Instead, security teams should consider re-optimizing their current security stack by ensuring their technology has been configured correctly while continuously testing for drift over time. No amount of security controls will matter if your security products don’t work as intended—so do you really need to buy yet another product? Join our conversation as we discuss how to do more with less by optimizing your current technology, applying actionable security metrics via frameworks like MITRE and performing a pragmatic approach to risk-based vulnerability management and prioritization.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

June 18, 2020
5:30 PM – 6:45 PM PT
West Coast: California, Washington

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Kannan Perumal

Kannan Perumal
CISO
Applied Materials
Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

June 17, 2020
4:30 PM – 5:45 PM MT
5:30 PM – 6:45 PM CT
6:30 PM – 7:45 PM ET
North Central Region: North Dakota, South Dakota, Minnesota, Iowa, Illinois, Wisconsin, Michigan, Indiana, Ohio, Kansas, Missouri, New Mexico, Nebraska

ISE® VIP Hosts:

Robert Allen

Robert Allen
Global Chief Information Security Officer
Gallagher

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

June 16, 2020
5:30 PM – 6:45 PM CT
TOLA Region: Texas, Oklahoma, Louisiana, Arkansas, New Mexico

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Gary Toretti
SVP, Chief Information Security Officer
CBRE Holding, Inc.

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 11, 2020
5:30 PM – 6:45 PM ET
Massachusetts, Toronto

ISE® VIP Hosts:

Hussey_Eric

Eric Hussey
CISO
PTC Inc.
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

June 10, 2020
5:30 PM – 6:45 PM ET
Northeast Region: New York, New Jersey

ISE® VIP Hosts:

Linda Angles

Linda Cooper Angles
Chief Information Security Officer
Conduent

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Collective Defense: A Shared Approach to Combating Cyber Attacks

June 9, 2020
5:30 PM – 6:45 PM ET
Mid-Atlantic Region: Pennsylvania, Washington D.C., Maryland, Delaware, Virginia, West Virginia

ISE® VIP Hosts:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

young_roger

Roger Young
Director of Information Security and Compliance
Morgan, Lewis & Bockius LLP
Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers; the rise of cyber mercenary groups and threat sourcing by nation-state actors; and now, adversaries taking advantage of the COVID-19 situation. No company can stand alone against today’s coordinated ecosystem of sophisticated cyber threats. To defend against these constantly evolving threats, we need to employ a Collective Defense strategy by adopting a new method that applies behavioral detection which enables companies to share threat intelligence in near real-time for faster response. Join our conversation as we discuss strategies for adopting Collective Defense across organizations and examine how we can defend together against “imminent” attacks by nation-states and cyber criminals.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Stop Buying Security Products: Fix Your Security Posture Using What You Have

June 2, 2020
5:30 PM - 6:45 PM PT
West Coast Region: Washington, California, Oregon, Arizona

ISE® VIP Hosts:

ewell_cris

Cris Ewell
CISO
UW Medicine
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Is your organization protected against every known attack, including the vulnerabilities announced yesterday? Zero-day attacks garner plenty of attention, but the truth is 99% of all cyberattacks occur due to hackers exploiting existing or known vulnerabilities. You likely already have cybersecurity products that could protect you, but chances are they have not been configured correctly to your enterprise’s specific risk profile. For instance, Gartner estimates that 95% of firewall breaches are caused by simple firewall misconfigurations, yet 97% of breaches are still happening to companies that have already deployed the right controls. Breaches are arising more often because complexity is your enemy. If your security team is managing too many solutions—some of which might not be optimal for your current enterprise security requirements—then a simple misconfiguration or drift is all an attacker needs to exploit within your security stack to gain entrance. You do not need another security product. You just need to use what you have, better. Join our conversation as we discuss how to continually and safely test every part of your security infrastructure for gaps as well as how to prioritize remediation based on business risk.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

May 28, 2020
4:30 PM – 5:45 PM CT
5:30 PM – 6:45 PM ET
Southeast Region: West Virginia, North Carolina, South Carolina, Mississippi, Alabama, Georgia, Florida

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Bob Varnadoe

Bob Varnadoe
Chief Information Security Officer
NCR
ISE® Southeast Executive Award Finalist 2018
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

May 28, 2020
2:30 PM – 3:45 PM HT
5:30 PM – 6:45 PM PT
6:30 PM – 7:45 PM MT
Southwest Region: Southern California, Nevada, Utah, Colorado, Arizona, Hawaii

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Michael St. Vincent
Chief Information Security Officer
The Cosmopolitan of Las Vegas
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Your Network Through a Hacker’s Eyes: Preparing for the Inevitable and the Unexpected

May 27, 2020
5:30 PM – 6:45 PM CT
Midwest Region: Minnesota, Wisconsin, Illinois

ISE® VIP Hosts:

Betty Elliott
Partner, Chief Information Security Officer
Mercer
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Forbes Magazine estimates that global information security spending now exceeds $100 billion annually, yet we are witnessing high-profile breaches and losses from cyberattacks on a near-constant basis. The fact is this: hackers are dedicated and patient. All it takes is one weak point in your security measures for them to access your system, so what are you going to do after they have breached your perimeter? To prepare for this inevitability, enterprise security teams will need to view their network the way hackers see it and pinpoint all existing, hidden vectors of attack. That includes incorporating a robust Identity Management and Authentication strategy to pinpoint who is accessing enterprise systems and how—no matter the circumstances. Overnight, enterprises shifted to having their workforce operate remotely, meaning there was little time to create roles and identities while ensuring everyone had access to their work. Most business continuity plans were not broad enough to anticipate that everyone would be displaced at the same time, and security teams struggle with knowing if their prior strategy for managing and authenticating identities is picking up the slack. Who is seeing what, and what data is being exposed? Join our conversation as we discuss how to view your network like a hacker does to locate vulnerabilities as well as assess how effective our identity management strategy and business continuity plans have proven in the face of the inevitable and the unexpected.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Modern Authentication in a Post-COVID World

May 27, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch this webinar Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Stacy Hughes

Stacy Hughes
Chief Information Security Officer
Global Payments, Inc.
Biography

Thomas (TJ) Jermoluk
Chief Executive Officer & Co-Founder
Beyond Identity
Biography

John Masserini

John Masserini
Global CISO
Millicom International Cellular
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010

Biography

The rapid shift to remote work brought about by COVID-19 has made it clear that identity is the new perimeter. While many companies had been moving to cloud before the outbreak, those that hadn't found themselves unable to support their now-distributed workforces. The pandemic has served as a clarion call for companies to adopt infrastructure that enables people to work anywhere, anytime. In order to do that, companies need strong authentication to know exactly who is coming through their perimeter, a fine-grained, risk-based way to regulate what they're able to access, and in-depth reporting for compliance, audit, and security operations needs. Meanwhile, companies need to achieve all this in a way that doesn't introduce user friction or insecurity, two common complaints arising from the use of passwords. What if there were a better way? A way that enabled passwordless authentication to support strong security, reduce user friction, and enable distributed employees? Join our conversation as we discuss a modern, cloud-first approach to identity management that enables continuous, risk-based authentication and authorization as well as achieves a Zero Trust security posture, all while answering, “How do we get there?”

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

May 26, 2020
4:30 PM – 5:45 PM CT
5:30 PM – 6:45 PM ET
Region: Maine, Vermont, New Hampshire, Rhode Island, Connecticut, Massachusetts, Kentucky, Tennessee

ISE® VIP Host:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Tompkins_Tim

Tim Tompkins
Vice President & Deputy Chief Information Security Officer
CVS Health
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® COCKTAILS AND CONVERSATIONS
Modernize Your SOC to Multiply Your Output

May 14, 2020
5:30 PM – 6:45 PM ET
Northeast Region: New York, New Jersey, Pennsylvania, Delaware, Maryland, Washington DC, Virginia

ISE® VIP Hosts:

John Graham

Kirsten Davies
SVP & Chief Information Security Officer
The Estée Lauder Companies
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Organizations are facing constantly rising costs, management overhead and poor threat detection from their legacy SIEM deployments. Security teams often find themselves short on time and resources as well as burdened by alert fatigue and false positives, rendering them unable to keep up with today’s threats. Security analysts need an incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks in seconds, not hours as with legacy solutions. What are the best practices for scaling cost, output efficiency and interoperability in order to establish a modern SOC? Join our conversation as we discuss the challenges of multiple or legacy SIEMs as well as how enterprises are navigating toward security maturity in the SOC, especially in this new chapter of remote working.

Attendees of the ISE® Cocktails and Conversations will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: IT Security? Check! But What About Your OT Security?

May 14, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch this webinar Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Antova_Galina Galina Antova
Co-Founder
Claroty
Biography

Dawn Cappelli
VP, Global Security and CISO
Rockwell Automation
Biography

Curley Henry
Executive Director, Cybersecurity Strategy and Architecture
Southern Company
Biography

The digital transformation of industrial systems yields numerous benefits and efficiencies for business, but the resulting interconnectivity between these systems and an organization’s IT network has made operational technology (OT) increasingly susceptible to cyber threats. While the role of CISOs in dealing with IT network security is well defined, many security leaders do not possess clear methods about how they can defend OT systems effectively. In fact, IT and OT teams are often kept separate without clear lines of communication about the other’s security processes. Further complicating matters, traditional IT security tools are not compatible with OT environments, and conventional wisdom for defending IT environments is not always applicable. The world literally runs on Industrial Control Systems, and they are attractive targets for state actors and other cybercriminals to attack, making them imperative to keep safe. Join our conversation as we discuss best practices to develop comprehensive OT security for converged IT/OT environments with strategies that identify, detect, protect against and respond to the latest cyberattacks.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: You Just Saved the Company—Again—But Does the C-Suite Understand How?

May 12, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch this webinar Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Guy Bejerano
CEO & Co-Founder
SafeBreach

nolan_david

Yaron Levi
Chief Information Security Officer
Blue Cross Blue Shield of Kansas City
Biography

Jed Young
CISO
Jabil
Biography

Most security teams struggle to communicate with business executives in a strategic manner. Business executives likewise struggle to translate security metrics into business indicators they can work with. Cybersecurity executives are tasked with helping the C-suite and board understand complicated issues, such as how much enterprise security posture changed in the past year as well as the impact their latest investments yielded for endpoint security defense. For that, they need to use the right language and metrics. Today, more executives are learning that control maturity scores are an insufficient measure of defense. They’d like to understand how secure the organization is in the face of all cyber threats that are active in the wild at any given time. While security teams have great insight, there is a gap between reporting baseline measures of the organization’s security posture to executives, mapping the security posture to specific threats of immediate concern and presenting data-driven metrics to support actionable mitigations that will assure the board that the organization is well protected. Join our conversation as we discuss effective methods for security teams to collect actionable metrics about their enterprise security posture; how to determine organization-wide preparedness for specific types of threats and strategies for improvement; and ways to communicate these insights to the board and cross-functional teams effectively.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: The Future of Vulnerability Management

May 7, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
Watch this webinar Video on Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Bobby Dominguez
SVP, Chief Information Security Officer
City National Bank
Biography

Jimmy Graham
Senior Director, Product Management
Qualys
Biography

Gene Scriven

Gene Scriven
Chief Information Security Officer
ACI Worldwide
ISE® Southeast People’s Choice Award Winner 2008
ISE® Southeast Executive Award Finalist 2008

Biography
T.E.N. Success Story

Enterprises have long struggled with maintaining complete visibility into their entire hybrid environment and making sure all systems stay properly updated and patched. Despite the investment in security teams, processes and technology, vulnerabilities and system misconfigurations remain the most common source of cybersecurity breaches. Meanwhile, vulnerabilities continue to increase in number and severity, leaving security and IT teams with unidentified devices, misclassified assets, an overabundance of alerts and overlooked system patches. For many organizations, today’s vulnerability management programs involve multiple teams and disjointed solutions, making it difficult for organizations to identify and remediate the most serious threats. Join our conversation as we discuss the need for prioritization and how to speed response and remediation for the most critical vulnerabilities.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Cyber Attackers Have an Inherent Advantage: How Do We Change That?

April 30, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
View this webinar Video On Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Rob N. Gurzeev
CEO & Co-Founder
CyCognito
Biography

Craig  Froelich

Joey Johnson
CISO
Premise Health
ISE® Southeast Executive of the Year Award Winner 2017
ISE® North America Executive: Health Care Award Finalist 2017

Biography

Laura Whitt-Winyard

Laura Whitt-Winyard
Global Chief Information Security Officer
DLL
Biography

In today’s asymmetrical warfare between cybercriminals and organizations, the cards are stacked against the good guys. While attackers only have to find one weak spot, security teams have to monitor and protect everything at all times, which in many instances dictates only one, virtually predestined outcome of the battle. With every marquee name that is breached, it is clear that crippling cyberattacks have become the new normal. Although this “era of insecurity” began more than 10 years ago, it has become more and more extreme in recent years, and there are three main factors that exacerbate the current situation. The first is that cybercrime is lucrative, and offensive scanning and exploitation tools have become cheaper, more automated and widely available to attackers. Second, in the hyperconnected IT ecosystem of today’s organizations, it is exponentially more difficult to continuously monitor and debug everything in a timely fashion. Finally, we are losing sight of security risks. Without a complete view of an organization’s entire attacker-exposed IT ecosystem—including risk from cloud, third-party and subsidiary environments—and an understanding of the business context of its assets, an organization cannot appropriately assess, prioritize and eliminate its most critical risks. Join our conversation as we discuss cybersecurity strategies that will turn the tables on our adversaries as well as regain visibility into our organization’s IT ecosystem, allowing us to locate and mitigate our most dangerous risks before they can be exploited.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

ISE® FIRESIDE WEBINAR: Mitigating Device Security Risks in Data Centers, Remote Use and Supply Chains

April 28, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
View this webinar Video On Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Bulygin_Yuriy

Yuriy Bulygin
Founder & CEO
Eclypsium
Biography

Mario Chiock

Mario Chiock
Schlumberger Fellow & Executive Cyber Security Adviser
Schlumberger International Inc
ISE® Central People's Choice Award Winner 2012
ISE® Central Executive Award Finalist 2012

Biography

Robert Mims

Robert Mims
Director, Security - Gas, Nuclear, Generation and Transmission Operations
The Southern Company
ISE® Southeast People's Choice Award Winner 2014
Biography

Firmware is often an enterprise’s unguarded attack surface. Laptops, mobile phones, servers, networking equipment and other devices contain many different components, and each one hosts millions of lines of code developed by various manufacturers that run independently of the operating system. Many organizations lack visibility into their firmware and hardware attack surface, leaving the enterprise at risk of device failures, ransomware and data breaches. A 2019 Gartner study estimates that 70% of organizations without a firmware upgrade plan in place will experience a breach due to a firmware vulnerability by 2022. Our collective shift to remote work has also introduced new vulnerabilities to our devices and environments that we did not anticipate. Join our conversation as we discuss best practices for CISOs and their security teams to mitigate security risks targeting the device integrity of data center environments, remote users and supply chains.

Attendees of the ISE® Fireside Webinars will earn 1 CPE upon its conclusion.

TechBridge & Goodwill of North Georgia’s Technology Career Program
Leveraging LinkedIn to Jumpstart & Fast-Track Your Tech Career

April 9, 2020
5:30pm - 7:00pm
Goodwill Career Center
3250 S. Cobb Drive
Smyrna, GA 30080
More information

Instructors

Marva Bailer

Marva Bailer
Director of Global Field Success Leadership and Executive Engagement
Splunk
Biography

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

TechBridge and Goodwill of North Georgia have partnered to provide the Technology Career Program (TCP), a free, 16-week program geared towards helping young students successfully develop their careers in business education and technology. “Leveraging LinkedIn to Jumpstart and Fast-Track Your Tech Career,” is a 90-minute class which will include the best practices of establishing a well-rounded LinkedIn profile as an important, professional presence for new jobseekers who want to make a great impression on prospective employers. Each TCP Student will learn how to set up an account, build a professional network, engage in postings, and follow companies and groups that interest them. Marci McCarthy of T.E.N. and Marva Bailer of Splunk, who are expert social media users as well as TechBridge Board Members, will lead the class, showing TCP Students how to communicate and connect with companies and peers in the technology industry as well as how to use LinkedIn to research interviewers, prospective employers and companies. With Marci and Marva’s thorough coaching, TCP Students will be better equipped to pursue their ambitions and jumpstart their path to success by leveraging the many benefits of using LinkedIn.

ISE® FIRESIDE WEBINAR: You Survived Transitioning to a Remote Workforce: Now How Do You Secure It?

April 2, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
View this webinar Video On Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Evangelakos_gus

Gus Evangelakos
Director of North American Field Engineering
XM Cyber
Biography

Ricardo Lafosse

Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company
ISE® Central Executive of the Year Award Winner 2019
ISE® North America Executive: Financial Award Finalist 2019

Tony Spurlin

Tony Spurlin
Vice President & Chief Security Officer
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

The rush to move employees to work remotely is creating huge opportunities for cyber criminals. Rapid changes to network configurations; unexpected utilization of unsecure networks and unsanctioned SaaS services; and inexperienced work-from-home users have expanded the attack surface too quickly for security teams to respond. In addition, travel restrictions and shelter-in-place rules are hampering IT and security team’s abilities to accomplish important security tasks, including planned penetration testing, red team exercises and testing security controls. Join our conversation as we review the challenges that must be addressed immediately, such as how remote security testing is a key tool to implement right now, as well as how prioritizing remediation based on the importance of digital assets at risk is critical during periods of rapid digital transformation.

Attendees of the ISE® Fireside Webinars will receive 1 CPE upon its conclusion and T.E.N. will provide this information to (ISC)2 to keep their credits current.

ISE® FIRESIDE WEBINAR: Next Generation Cybersecurity: The Call for Collective Defense

March 31, 2020
2:00 PM – 2:45 PM ET
11:00 AM – 11:45 AM PT
View this webinar Video On Demand

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Ehrlich_Michael

Michael Ehrlich
CTO
IronNet Cybersecurity
Biography

griffin_ray

Ray Griffin
Director, Head of Cyber Security
Cox Media Group
Biography

Dave Summitt
Chief Information Security Officer
H. Lee Moffitt Cancer Center & Research Institute
ISE® Southeast People's Choice Award Winner 2017
Biography

As cyber criminals, nation-states and other threat actors unite in collective offense against vulnerable enterprises, the call for collective defense among security professionals across the public and private sectors grows louder. Despite many cybersecurity professionals claiming confidence in their enterprise cyber defense technologies and systems—and continuing to invest in additional solutions—malicious attacks are still getting through. These attacks are avoiding detection, slipping past defenses and compromising network security, well before anyone realizes it has happened. Nation-state actors are joining together to dedicate economic and human resources to cyberattacks at a scale and speed that demand an equally coordinated defense. At a time when data breaches are impacting company reputations, job security and even national security, cyber defense is now a crucial issue for investors and corporate boards. So how can companies, industries and governments work together in real time to defend proactively at the same scale and speed as the coordinated attacks heading their way? Join our webinar as we discuss how collaborating on defense can shift an organization's threat detection strategy towards a more proactive posture and bolster its position against cyber criminals and state-actors as well as how security executives can get the C-suite and board in support of a collective defense approach.

Attendees of the ISE® Fireside Webinars will receive 1 CPE upon its conclusion and T.E.N. will provide this information to (ISC)2 to keep their credits current.

ISE® Southeast Executive Forum and Awards 2020

The ISE® Southeast Executive Forum and Awards 2020 were held March 11, 2020 at the Westin Peachtree Plaza Downtown in Atlanta, GA.

The ISE® Southeast Awards was held in conjunction with a one day Executive Forum which included keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offered the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® SOUTHEAST PRIVATE WELCOME DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

March 10, 2020
5:30pm - 8:30pm
STK Steakhouse
1075 Peachtree St NE
Atlanta, GA 30309
Levine_David

David Levine
CVP Corporate & Information Security, CSO
Ricoh USA Inc.
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 5, 2020
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219
Grizzle_Steven

Steven Grizzle
Director, Cybersecurity Operations
Sitel
Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

ISE® PRIVATE DINNER
Collective Defense: A Shared Approach to Combating Cyber Attacks

March 4, 2020
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4400 W Boy Scout Blvd
Tampa, FL 33607
Myrna Soto

Myrna Soto
COO, Digital Hands
Current Active Board Member, CMS Energy, Spirit Airlines and Popular Inc.
ISE® Northeast Executive Award Winner 2013
ISE® North America Commercial Executive Award Finalist 2013
ISE® North America Commercial Executive Award Finalist 2012
ISE® Northeast Executive Award Finalist 2012

Biography

Cyber attackers have relentlessly continued to exploit gaps in security programs—even as organizations are making massive investments in cyber defense. Security teams struggle to keep up with the speed of innovative cyberattacks, let alone get ahead of them. Moreover, threat actors are gaining power through collaboration and are constantly evolving their strategies. We have witnessed reported coordination between 2016 U.S. election hackers, the rise of cyber mercenary groups and threat sourcing by nation-state actors—making current tensions with Iran a top-of-mind issue for many cyber leaders. No company can stand alone against a modern, collaborative ecosystem of cyber threats. To defend against these constantly evolving threats, we need to employ a collective defense strategy by adopting a new method of defense that applies behavioral detection and enables companies to benefit from shared detection. Join our conversation as we discuss strategies for adopting collective defense across organizations and examine how we can defend against “imminent” attacks by nation-states and cyber criminals.

ISE® VIP Signature Luncheon with Secureworks During RSA® Conference 2020
Enabling Modern Security Operations to Scale Using the Power of Data Science and the Cloud

secureworks


February 27, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Modern security operations require a more agile, scalable, and effective model to address the challenges CISOs face with cloud and software-defined IT landscapes and escalating threats. This evolved approach demands a leap forward in capabilities powered by the speed and scale of machine learning, deep learning, and cloud computing. Join our conversation as we discuss how to put the power of data science and the cloud to work by analyzing vendor-inclusive data from the extended IT ecosystem. The insights gained will enable greater visibility, more reliable decision-making, and smarter automation.

ISE® VIP Reception with Digital Guardian During RSA® Conference 2020
Make the Leap to Cloud-Delivered Data Protection (DLP + MDR)

Digital Guardian


February 26, 2020
6:30 pm - 9:30 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
More information

Thanks to the emphasis on data privacy, we are witnessing a resurgence of Data Loss Prevention (DLP) within organizations. A Gartner study predicts that 85% of organizations will have implemented DLP by 2020, up from 50% in 2017. However, traditional DLP solutions are often limited to guarding against insider threats, forcing enterprises to enlist additional tools to defend against the variety of threats challenging security teams. As a result, security stacks become more complicated, signaling that it’s time to make the leap and allow your DLP strategy to advance with the rest of your security. Since cloud-based security continues to increase in demand, DLP also needs to be cloud-delivered and bolstered by Managed Detection and Response (MDR). Cyber attackers are smart; we need to be smarter. Join our conversation as we discuss how you and your security team can reinvent DLP with the cloud and MDR, simplify your security program and mitigate risks to your sensitive data.

ISE® VIP Signature Luncheon with Respond Software During RSA® Conference 2020
It’s the End of the SOC as We Know It (And I Feel Fine)

Respond Software


February 26, 2020
11:30 am – 1:30 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

Digital transformation is changing every part of the business, but when it comes to the security operations center (SOC), things haven’t changed much over the past ten years. Enterprises have many disparate security tools in place, and humans are sitting in the SOC, looking at mountains of data and trying to make a decision: Is this alert something to pay attention to, or is it just noise? The constant, overwhelming exposure to security alerts quickly adds up, in time, money and fatigue, leading to analyst burnout and high turnover with few conclusive security results to show for it. Whether your SOC is comprised of your own employees or handled by a service provider, you’ll want to ensure SOC members are happy, performing rewarding and impactful work, rather than getting lost in the trenches where machines and automation can flourish instead. To make a difference, you may have to get rid of filters, prioritize your people and reinvent your data management strategy in ways you never considered doing before. Join our conversation as we discuss how you can modernize your SOC, take advantage of new technology and change the way your SecOps team works.

T.E.N. & ISE® Sales and Marketing Breakfast During RSA® 2020
Standing Out in a Crowded Playing Field by Building Trusted Relationships With Cybersecurity Executives

TEN


February 26, 2020
7:45 am - 10:00 am
Oren’s Hummus San Francisco
71 3rd St
San Francisco, CA 94103
More information

As technology evolves and cyber threats increase, CISOs need security solutions that will make their enterprise programs more efficient and their security teams better equipped to defend them. Every day, security vendors are producing new, innovative solutions, but getting into contact with CISOs can be tricky. The wrong approach can reduce a vendor’s chances to prove themselves, so how can they use their time with a CISO wisely to create the best first impression? Now more than ever, CISOs want to build genuine relationships with vendors who provide solutions specific to their organizational security needs. To stand out from your competitors, you will need to differentiate yourself, both in the language you use to refer to your products and in the way you communicate with security executives—and their teams. No CISO makes product decisions in a vacuum. They rely on their leadership and team members to guide uses of budget, time and productivity. To understand how to sell to a CISO successfully, you need to understand what they want and what their business and security team needs are. For that to happen, you have to build the relationship first. Taking the time to do so will illuminate areas you are likely in the dark about: What is your prospective client’s preferred method of contact, and what is an instant disqualifier? What does their company’s technology products road map look like along with the timeframe to implement these solutions? How can your solution remove complexity to their current security stack instead of adding to it?

ISE® VIP Reception with LookingGlass During RSA® Conference 2020
Obtaining 20/20 Vision: Look Deeper and Act Faster With Smarter Intelligence-Driven Risk Management

LookingGlass


February 25, 2020
7:00 pm - 10:00 pm
Flytrap
606 Folsom St
San Francisco, CA 94107
More information

When your business is at risk, every second matters. The time your security teams spends researching and mitigating known threats is just as important as the time they lose at being unaware of hidden vulnerabilities. In order to obtain 20/20 vision of threats to your business, you will need to enlist an intelligence-driven risk management strategy that is seamless, comprehensive and fully integrated with your security and business needs. Keeping threats at bay on a global scale means meeting them on that scale with global attack surface monitoring, threat modeling, network defense and tailored intelligence-as-a-service. Each security partnership you forge should contribute actively to the defense of your enterprise network and beyond. The right threat intelligence partner will equip your security team with asset visibility and network traffic analysis along with the behavior and signature-based detection required to confidently protect your business. Join us to discuss the need for proactive global threat intelligence; the usefulness of advanced mitigation techniques such as deception and redirection; and how making the right security partnerships can enable us all to see more and act faster.

ISE® VIP Signature Luncheon with Cisco Umbrella During RSA® Conference 2020
Simplified Security Starts in the Cloud

cisco


February 25, 2020
12:00 pm – 2:00 pm
Fang Restaurant
660 Howard St.
San Francisco, CA 94105
More information

The average company uses more than 75 security tools. Firewalls. Web proxies. SIEM. Appliances. Third-party intelligence. The list goes on… What do these tools have in common? They lead to silos and a sea of security alerts for overwhelmed staff who struggle to make sense of it all. With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users a growing target for attacks, it’s likely that your existing security stack is coming up short—and you’re not alone. There is a better way to secure cloud applications and internet access for on-the-go users. Join our conversation as we discuss the resulting security challenges and why many organizations are shifting security services to the cloud to reduce complexity, deliver greater flexibility and enact more consistent enforcement.

ISE® VIP Private Dinner with Cisco During RSA® Conference 2020
Cleaning Out Your Security Closet

cisco


February 24, 2020
6:30 pm – 9:30 pm
Mastro’s Steakhouse
399 Geary St.
San Francisco, CA 94102
More information

Security professionals go hand-in-hand with processes and technology. As security threats evolve and escalate, we tend to accumulate more and more tools and methods until our security stacks become cluttered and too complicated. If Marie Kondo were helping you tidy up, what would you remove from your security portfolio? We all have technologies and processes we cling to, not because we necessarily need them but because they are comfortable and familiar. If we take a step back and look at the bigger picture, we can determine the security solutions and processes we can live without while pinpointing what gaps we still need to fill. Join our conversation as we discuss a Marie Kondo approach to trimming down and cleaning up your security closet while also asking ourselves the inevitable question: does anything really spark joy in cybersecurity?

ISE® VIP Welcome Reception with Ionic Security During RSA® Conference 2020
Say Goodbye to Gridlock: The Shift of Modern Data Protection

Ionic


February 23, 2020
5:30 pm – 7:30 pm
Fogo de Chão
201 3rd St #100
San Francisco, CA 94103
More information

All too often, enterprise data security is siloed, but sensitive data is not. Data travels between and resides in applications, data stores, devices and different environments. Every point of access has a context, driven by identity, attributes and complex access policies, which can quickly overwhelm enterprises using disparate solutions and relying on siloes. What results is data security gridlock, which undermines the performance of your business and security team since they cannot scale data protection with the enterprise. For decades, security has focused on securing the gates, moats and fences around where data resides, but that is no longer an effective procedure. Now that location is no longer definitive, we need to go back to the basics and ask a simple question: Why don’t we just start with eliminating gridlock and protecting the data? Join our conversation as we discuss how to seamlessly enable scalable, sustainable and consistent data protection by securing sensitive data from unauthorized access and breaches, wherever it lives or travels.

ISE® PRIVATE DINNER
From Candidate to Expert: Cyber Range Training Across the Entire Employee Lifecycle

February 20, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Cindy Cullen

Cindy Cullen
Global Director Information Security
Interpublic Group
Biography

Cyber threats are ever-increasing and aggressive, causing no shortage of trouble for overworked and understaffed security teams. According to Gartner’s 2019 CIO Agenda, 95% of CIOs expect cybersecurity threats to get worse. Enterprises are looking for innovative candidates to join as security professionals, but hiring and training employees can be a challenge in and of itself. Enter cyber ranges, controlled virtual environments where white hats can train extensively to repel the worst efforts of cyber attackers and hone their skills. Enterprises, non-profits, universities and global governments can buy a cyber range, buy time on a cyber range—or even build their own or use less immersive gamification platforms to train. Practice makes perfect, and by using a cyber range, security candidates can become experts without any organization needing to exposure their infrastructure. Join our conversation as we discuss how to use cyber ranges throughout the entire lifecycle of a security professional—from screening and assessing candidates to onboarding and retention—as well as how they improve SOC productivity and preparedness for real-world attacks.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 19, 2020
5:30pm - 8:30pm
The Capital Grille
1861 International Dr.
McLean, VA 22102

Mike Newborn
Chief Information Security Officer
Navy Federal Credit Union

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

February 18, 2020
5:30pm - 8:30pm
Morton’s The Steakhouse
227 W Trade St., Suite 150
Charlotte, NC 28202
Tim Morris

Tim Morris
Information Security Area Manager, SVP, Cyber Threat Engineering & Research
Wells Fargo & Company
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 12, 2020
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
murphy_sean

Sean Murphy
SVP, CISO
BECU
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

February 11, 2020
5:30pm - 8:30pm
Waterbar
399 The Embarcadero
San Francisco, CA 94105
hahn_david

David Hahn
Chief Security Officer
Silicon Valley Bank
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Stop Buying Security Products: Fix Your Security Posture Using What You Have

February 5, 2020
5:30pm - 8:30pm
Del Frisco's Double Eagle Steakhouse
236 Perimeter Center Pkwy NE
Suite 120
Dunwoody, GA 30346
Tony Spurlin

Tony Spurlin
Vice President & Chief Security Officer
Windstream
ISE® North America People's Choice Award Winner 2005
ISE® Southeast Executive Award Finalist 2018

Biography

Is your organization protected against every known attack, including the vulnerabilities announced yesterday? Zero-day attacks garner plenty of attention, but the truth is 99% of all cyberattacks occur due to hackers exploiting existing or known vulnerabilities. You likely already have cybersecurity products that could protect you, but chances are they have not been configured correctly to your enterprise’s specific risk profile. For instance, Gartner estimates that 95% of firewall breaches are caused by simple firewall misconfigurations, yet 97% of breaches are still happening to companies that have already deployed the right controls. Breaches are arising more often because complexity is your enemy. If your security team is managing too many solutions—some of which might not be optimal for your current enterprise security requirements—then a simple misconfiguration or drift is all an attacker needs to exploit within your security stack to gain entrance. You do not need another security product. You just need to use what you have, better. Join our conversation as we discuss how to continually and safely test every part of your security infrastructure for gaps as well as how to prioritize remediation based on business risk.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 30, 2020
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4023 Oak Lawn Ave
Dallas, TX 75219
Shamoun Siddiqui

Shamoun Siddiqui
VP, CISO
Neiman Marcus
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 29, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
114 W. 7th Street #110
Austin, TX 78701

Sameer Sait
CISO, Whole Foods Market
Amazon
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 28, 2020
5:30pm - 8:30pm
Steak 48
4444 Westheimer Rd., Ste A100
Houston, TX 77027

Martin Littmann
CTO & CISO
Kelsey-Seybold Clinic
Biography

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

Women in Cybersecurity 2020

January 27, 2020
5:30pm - 7:45pm
UHY Advisors
6 Concourse Parkway
Suite 1700
Atlanta, GA 30328

Moderator:

Harper Lisa Bronson
Enterprise Portfolio Manager
Signature Consultants

Panelists:

Donna Gallaher
CEO & President
New Oceans Enterprises LLC

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Cindy Taylor
COO
Ensignis

Don’t miss the conversation around the topic that has been mentioned everywhere as one of the key issues for this decade. Women in IT are a minority, but Women in Cybersecurity are a true rarity. Be prepared to hear how these female executive cyber experts contribute to the field of defense in our nation and institutions.

Digital Hands 7th Annual Gasparilla Cybersecurity Summit
Preparing the Cybersecurity Workforce: Education, Simulation and Demographics

January 24, 2020
10:45am - 11:25am
Fletcher Lounge in Plant Hall
374 UT University Dr.
Tampa, FL, 33606
More Information

Panelists:

Cabrera_Eduardo

Eduardo Cabrera
Chief Cybersecurity Officer
Trend Micro

Ensmann_Mai

Mai Ensmann
Associate to the Director
Georgia State University’s Evidence-Based Cybersecurity Research Group

Gordon_Debbie

Debbie Gordon
CEO
Cloud Range

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Join Digital Hands’ panel where these top-tier leaders discuss improving diversity, education and mentorship in cybersecurity to shift our focus in the industry towards optimal success and a greater, stronger workforce.

Digital Hands 7th Annual Gasparilla Cybersecurity Summit
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

January 24, 2020
4:00pm - 4:30pm
Fletcher Lounge in Plant Hall
374 UT University Dr.
Tampa, FL, 33606
More Information

Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

January 23, 2020
5:30pm - 8:30pm
Harbour 60
60 Harbour St.
Toronto, ON M5J 1B7
thompson_greg

Greg Thompson
Vice President, Chief Information Security Officer
Manulife
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Farewell to Network Security as We Know It

January 22, 2020
5:30pm - 8:30pm
The Capital Grille
1861 International Dr
McLean, VA 22102

Netskope Executive Speaker:

Sean Cordero
VP of Cloud Strategy
Netskope
Biography

ISE® VIP Host:

Evette Maynard-Noel Evette Maynard-Noel
Deputy CISO
Cybersecurity and Infrastructure Security Agency (CISA)
Biography

Digital transformation as well as cloud-first and mobile-first security strategies are impacting every company across the globe, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can we manage the risk of what we cannot control or see? The problem exacerbates when we consider if we are granting users too much access to data we are not monitoring closely enough. Adopting a Zero Trust model could be the way to go, and top cloud security use cases are also driving the need for high-speed edge networks with security that follows the user, not the device. If you’re stuck using a legacy security stack, however, these options may not be easily enacted, but change is possible. Join our conversation as we discuss how to transform your network security strategy; integrate true Zero Trust; and address next-gen strategies using firewalls (NGFW), secure web gateways (SWGs), secure access (VPNs) and high-speed edge networks.

ISE® PRIVATE DINNER
Farewell to Network Security as We Know It

January 21, 2020
5:30pm - 8:30pm
Perry's Steakhouse & Grille
4 Perimeter Park South
Birmingham, AL 35243

Netskope Executive Speaker:

Nate Smolenski

Nate Smolenski
Director of Enterprise Strategy
Netskope

ISE® VIP Host:

Rasco_Brian

Brian Rasco
Director of Information Security
Nationally Ranked Medical Center
Biography

Digital transformation as well as cloud-first and mobile-first security strategies are impacting every company across the globe, causing next-gen security teams to rethink their entire legacy security stack. In the process, we have lost control of data protection and visibility. How can we manage the risk of what we cannot control or see? The problem exacerbates when we consider if we are granting users too much access to data we are not monitoring closely enough. Adopting a Zero Trust model could be the way to go, and top cloud security use cases are also driving the need for high-speed edge networks with security that follows the user, not the device. If you’re stuck using a legacy security stack, however, these options may not be easily enacted, but change is possible. Join our conversation as we discuss how to transform your network security strategy; integrate true Zero Trust; and address next-gen strategies using firewalls (NGFW), secure web gateways (SWGs), secure access (VPNs) and high-speed edge networks.

ISE® PRIVATE DINNER
From Known to Zero-Day Threats: Leverage AI for Continuous Detection and Response

January 16, 2020
5:30pm - 8:30pm
Tulio – Kimpton Hotel Vintage
1100 Fifth Ave.
Seattle, WA 98101
Kevin Morrison

Kevin Morrison
Managing Director, Enterprise Information Security and Chief Information Security Officer
Alaska Air Group
ISE® Southeast People’s Choice Award Winner 2015
Biography

The cybersecurity talent shortage along with overwhelming numbers of security alerts mean enterprise security teams have little time to hunt and analyze the threats that matter. While security teams naturally want to defend their organizations against the threats they know about, they sometimes lack the resources to do so. With zero-day vulnerabilities especially, security teams might not know they have them, and if they do, they cannot patch them before a cyber attacker successfully exploits them. By utilizing AI and 24/7 managed detection and response, security members can be taken out of the weeds and elevated to conduct transparent, proactive threat hunting in real time. Join our conversation as we discuss the challenges enterprise security teams face to locate and remediate vulnerabilities and how they can collaborate best with an MSSP’s platform that incorporates data science, threat research and human expertise to limit a breach’s impact.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 15, 2020
5:30pm - 8:30pm
Oak Steakhouse
4777 Sharon Rd #125
Charlotte, NC 28210
cody_drake

Drake Cody
Assistant VP, Cyber-Security Operations
Brighthouse Financial

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.

ISE® PRIVATE DINNER
Hey Hey, You You, Get Off of My Cloud: Deploying Zero Trust Networking in the Modern Data Center

January 14, 2020
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Lamberg_Mike

Mike Lamberg
VP, CISO
OpenLink Financial

As many firms transition their data centers into the cloud and other heavily virtualized environments, the old practice of implementing choke points to force data flows through a select set of avenues simply doesn’t work anymore. According to Gartner, by “2025, 80% of enterprises will have shut down their traditional data center, versus 10% today.” How will security respond when evolving data centers represent a gigantic blind spot where basic visibility, compliance and enforcement become impossible? Join our conversation as we discuss key cybersecurity challenges when moving from perimeter security to distributed security along with best practices for implementing Zero Trust data center security for cloud-based architectures.