Cyber Security Digital Summit - May 2020

May 5-7

By attending this digital event, you're eligible to receive CPE credits from ISC2  

Scaling Enterprise Threat Detection And Response

  • Cyber-attackers are utilizing new technology and automation to discover more vulnerabilities more rapidly
  • What are practical ways for the enterprise security team to match the scope and scale of cyber-attacks?
  • How does the cyber ecosystem enable detection and response value beyond enterprises scaling personnel?
High-tech artificial intelligence, behavioral analytics and autonomous solutions mean that our arsenal is full when facing new threats. However, innovative tools that can be used to detect and respond to attacks can similarly be used by criminals against enterprise defenders, meaning that understanding and harnessing cutting-edge technology is vital to surviving.

Cyber Security Hub has united experts from every aspect of this space to present their most compelling case studies and real-world advice on subjects ranging from artificial intelligence, threat detection and response, critical communications, secure enterprise mobility, phishing, behavioral analytics, identity & access management and more. By the end of the event, you will have the tools necessary to build a “360° plan” for your enterprise.

Join us over three days in May to learn from world-class InfoSec experts and share best practices with peers to help build a more robust cyber security network without leaving your desk.


Tuesday, May 5th, 2020
9:00 - 9:45 am Risk Exchanges: Optimizing Intelligence Throughout the Vendor Lifecycle
                           Dan Harms, Third-Party Risk Consulting Manager, OneTrust Vendorpedia 

10:15 - 11:00 am Threat Detection And Threat Hunting Is A Process; One CISOs Journey
Dennis Leber, CISO, University of Tennessee Health Sciences Center
11:30 - 12:15 pm Patchwork of Privilege: Global State of Least Privilege

                                Erin Duncan, Product Marketing Manager, Thycotic   

12:45 - 1:30 pm How To Isolate And Contain An Incident (And Keep Your Executives Out Of The News)
                             Jim Brady

Wednesday, May 6th, 2020
9:00 - 9:45 am Detecting and Responding to Cyber Threats At The Speed Of Business
                                   Tim Condello, Global Technology Leader, Siemplify

10:15 - 11:00 am Best Practices for Thriving in an Ambiguous Cyber World    

11:30 - 12:15 pm Implementing A Layered Approach To Phishing And Whaling    

12:45 - 1:30 pm How To Isolate And Contain An Incident (And Keep Your Executives Out Of The News)    

Thursday, May 7th, 2020
9:00 - 9:45 am Strategies For Incident Response Without Endless Headcount
                                   Mike Welch, Managing Director GRC, MorganFranklin

10:15 - 11:00 am 5 Things to Know about Open Source Security
                                         Sharon Sharlin, Product Marketing Manager, White Source

11:30 - 12:15 pm Okta

12:45 - 1:30 pm The High Stakes of CISO Burnout
                                      Jothi Dugar, CISO

2020 Speakers

Dennis Leber

Chief Information Security Officer

Cabinet for Health and Family Services- State of Kentucky

Jothi Dugar



Mike Welch

Managing Director Risk & Strategy

MorganFranklin Consulting

Sharon Sharlin

Product Marketing Manager


Tim Condello

Global Technology Leader


Erin Duncan

Product Marketing Manager


Dan Harms

Third-Party Risk Consulting Manager

OneTrust Vendorpedia

Frederico Hakamine

Sr. Product Marketing Manager


Lane Roush

VP of Presales Systems Engineering

Arctic Wolf

2020 Sponsors

Contact Us

Have any questions? Reach out to us!