Cyber Security Digital Summit - May 2020

May 5-7

By attending this digital event, you're eligible to receive CPE credits from ISC2  

Scaling Enterprise Threat Detection And Response

  • Cyber-attackers are utilizing new technology and automation to discover more vulnerabilities more rapidly
  • What are practical ways for the enterprise security team to match the scope and scale of cyber-attacks?
  • How does the cyber ecosystem enable detection and response value beyond enterprises scaling personnel?
High-tech artificial intelligence, behavioral analytics and autonomous solutions mean that our arsenal is full when facing new threats. However, innovative tools that can be used to detect and respond to attacks can similarly be used by criminals against enterprise defenders, meaning that understanding and harnessing cutting-edge technology is vital to surviving.

Cyber Security Hub has united experts from every aspect of this space to present their most compelling case studies and real-world advice on subjects ranging from artificial intelligence, threat detection and response, critical communications, secure enterprise mobility, phishing, behavioral analytics, identity & access management and more. By the end of the event, you will have the tools necessary to build a “360° plan” for your enterprise.

Join us over three days in May to learn from world-class InfoSec experts and share best practices with peers to help build a more robust cyber security network without leaving your desk.


Agenda

Tuesday, May 5th, 2020
9:00 - 9:45 am Risk Exchanges: Optimizing Intelligence Throughout the Vendor Lifecycle
                           Dan Harms, Third-Party Risk Consulting Manager, OneTrust Vendorpedia 

10:15 - 11:00 am Threat Detection And Threat Hunting Is A Process; One CISOs Journey
                                
Dennis Leber, CISO, University of Tennessee Health Sciences Center
   
11:30 - 12:15 pm Patchwork of Privilege: Global State of Least Privilege

                                Erin Duncan, Product Marketing Manager, Thycotic   

12:45 - 1:30 pm Real-Time Change In Incident Management
                             Jim Brady, Chief Information Officer, Los Angeles County Department of Health Services

Wednesday, May 6th, 2020
9:00 - 9:45 am Detecting and Responding to Cyber Threats At The Speed Of Business
                                         Tim Condello, Global Technology Leader, Siemplify

10:15 - 11:00 am Implementing A Layered Approach To Phishing And Whaling
                                Suresh Chawdhary, Head of Security & Privacy, Nokia

11:30 - 12:15 pm 
Reducing Threat Impact with the Top 20 CIS Security Controls
                                    Lane Roush, VP of Presales Systems Engineering, Arctic Wolf 

12:45 - 1:30 pm A Practical Approach to Zero Trust Security
                                    Baber Amin, CTO NA West, Ping Identity
                                        Phil Allen, Vice President, EMEA, Ping Identity
                           

Thursday, May 7th, 2020
9:00 - 9:45 am 
Best Practices for Thriving in an Ambiguous Cyber World
                                   Christine Vanderpool, CISO, Florida Crystals

10:15 - 11:00 am 5 Things to Know about Open Source Security
                                         Sharon Sharlin, Product Marketing Manager, White Source

11:30 - 12:15 pm Enable Secure Velocity at Scale: DevOps Automation with Identity
                                         Ivan Dwyer, Group Product Marketing Manager, Okta

12:45 - 1:30 pm The High Stakes of CISO Burnout
                                      Jothi Dugar, CISO

2020 Speakers

2020 Sponsors

Contact Us

Have any questions? Reach out to us! Sponsorship@cshub.com