Welcome to the CISO Executive Network!

Please log in using the form to the right.
If you do not having a username and password, please take a moment to fill out our contact form to be considered for registration.

User login

Welcome, Guest

homelong

The CISO Executive Network is a peer-to-peer organization dedicated to helping information security, IT risk management, privacy, and compliance executives be more successful.  We accomplish this mission by providing opportunities for those professionals to meet periodically in their local cities to share with one another and hear from industry experts.

Chapters include: Atlanta, Bay Area (serving San Francisco, San Jose, Silicon Valley), Boston, Chicago, Columbus, Mid-Atlantic (serving Baltimore and DC), Philadelphia, Pittsburgh, New York, Toronto.

Here's what our members have to say:

"I participate in the CISO Executive Network because it affords me great opportunities to share information with my peers during the chapter meetings and outside of the meetings too. It is helpful to get the legal perspectives from the hosting firm as well as exposure to information and products from vendors. Overall, the CISO Executive Network is a well-run, well-organized forum with the added bonus of the Executive and Healthcare Summits each year. "  Keith Fricke, CSO, Catholic Health Partners

"I have the opportunity to attend numerous security conferences and roundtable events over the course of the year.  I've found roundtable events where ideas and challenges are shared among a group of peers to be most beneficial, and the CISO Executive Network is an excellent forum for this.  The perspectives, insights and experiences I gain from these get-togethers are invaluable in helping me formulate and solidify my own plans and strategies." Curtis Dalton, VP & CISO, Sapient


UPCOMING EVENT

AUGUST - SEPTEMBER:  IDENTITY AND ACCESS INTELLIGENCE

EXECUTIVE BREAKFAST ROUNDTABLE SERIES

In this Breakfast Roundtable Series we will discuss the important role that Identity & Access Management (IDM) solutions and processes have in the overall information security program.  We will also dive into the power of monitoring and analyzing IDM activities to derive "access intelligence" to help better manage risks in our environments.  As the end user becomes the "perimeter" through the use of mobile BYOD technologies it becomes even more important to know who is accessing your resources and what they are doing with those resources.

  • Identity & Access Management
  • Authentication Techniques
  • Federation
  • Privileged Identity Management
  • Access Intelligence (intersection of SEIM and IAM)
  • Risk Based Authentication

Register from your Chapter Home page.

Recent Sponsors

Industry Partners