Cyber Security Digital Summit - May 2020

May 5-7

By attending this digital event, you're eligible to receive CPE credits from ISC2  

Scaling Enterprise Threat Detection And Response

  • Cyber-attackers are utilizing new technology and automation to discover more vulnerabilities more rapidly
  • What are practical ways for the enterprise security team to match the scope and scale of cyber-attacks?
  • How does the cyber ecosystem enable detection and response value beyond enterprises scaling personnel?
High-tech artificial intelligence, behavioral analytics and autonomous solutions mean that our arsenal is full when facing new threats. However, innovative tools that can be used to detect and respond to attacks can similarly be used by criminals against enterprise defenders, meaning that understanding and harnessing cutting-edge technology is vital to surviving.

Cyber Security Hub has united experts from every aspect of this space to present their most compelling case studies and real-world advice on subjects ranging from artificial intelligence, threat detection and response, critical communications, secure enterprise mobility, phishing, behavioral analytics, identity & access management and more. By the end of the event, you will have the tools necessary to build a “360° plan” for your enterprise.

Join us over three days in May to learn from world-class InfoSec experts and share best practices with peers to help build a more robust cyber security network without leaving your desk.


Agenda

Tuesday, May 5th, 2020
9:00 - 9:45 am Risk Exchanges: Optimizing Intelligence Throughout the Vendor Lifecycle
                           Dan Harms, Third-Party Risk Consulting Manager, OneTrust Vendorpedia

10:15 - 11:00 am Threat Detection And Threat Hunting Is A Process; One CISOs Journey
                                
Dennis Leber, CISO, University of Tennessee Health Sciences Center
   
11:30 - 12:15 pm Patchwork of Privilege: Global State of Least Privilege

                                Erin Duncan, Product Marketing Manager, Thycotic   

12:45 - 1:30 pm How To Avoid Becoming Overwhelmed By The Unknown
                             Jothi Dugar, CISO, NIH Center for Information Technology

Wednesday, May 6th, 2020
9:00 - 9:45 am Detecting and Responding to Cyber Threats At The Speed Of Business
                                   Tim Condello, Senior Customer Success Manager, Siemplify

10:15 - 11:00 am Best Practices for Thriving in an Ambiguous Cyber World    

11:30 - 12:15 pm Implementing A Layered Approach To Phishing And Whaling    

12:45 - 1:30 pm How To Isolate And Contain An Incident (And Keep Your Executives Out Of The News)    

Thursday, May 7th, 2020
9:00 - 9:45 am Strategies For Incident Response Without Endless Headcount
                                   Mike Welch, Managing Director GRC, MorganFranklin

10:15 - 11:00 am 5 Things to Know about Open Source Security
                                         Sharon Sharlin, Product Marketing Manager, White Source

11:30 - 12:15 pm Okta

12:45 - 1:30 pm Panel: Discussion Of Threat Detection And Incident Response Best Practices & Experiences

2020 Speakers

Dennis Leber

Chief Information Security Officer

Cabinet for Health and Family Services- State of Kentucky

Jothi Dugar

CISO

National Institutes of Health Clinical Center

Mike Welch

Managing Director Risk & Strategy

MorganFranklin Consulting

Sharon Sharlin

Product Marketing Manager

WhiteSource

Tim Condello

Senior Customer Success Manager

Siemplify

Erin Duncan

Product Marketing Manager

Thycotic

Dan Harms

Third-Party Risk Consulting Manager

OneTrust Vendorpedia

Frederico Hakamine

Sr. Product Marketing Manager

Okta

2020 Sponsors

Contact Us

Have any questions? Reach out to us!