9:00 - 9:45 am Risk Exchanges: Optimizing Intelligence Throughout the Vendor Lifecycle
Dan Harms, Third-Party Risk Consulting Manager, OneTrust Vendorpedia
10:15 - 11:00 am Threat Detection And Threat Hunting Is A Process; One CISOs Journey
Dennis Leber, CISO, University of Tennessee Health Sciences Center
11:30 - 12:15 pm Patchwork of Privilege: Global State of Least Privilege
Erin Duncan, Product Marketing Manager, Thycotic
12:45 - 1:30 pm Real-Time Change In Incident Management
Jim Brady, Chief Information Officer, Los Angeles County Department of Health Services
9:00 - 9:45 am Detecting and Responding to Cyber Threats At The Speed Of Business
Tim Condello, Global Technology Leader, Siemplify
10:15 - 11:00 am Implementing A Layered Approach To Phishing And Whaling
Suresh Chawdhary, Head of Security & Privacy, Nokia
11:30 - 12:15 pm Reducing Threat Impact with the Top 20 CIS Security Controls
Lane Roush, VP of Presales Systems Engineering, Arctic Wolf
12:45 - 1:30 pm A Practical Approach to Zero Trust Security
Baber Amin, CTO NA West, Ping Identity
Phil Allen, Vice President, EMEA, Ping Identity
Thursday, May 7th, 2020
9:00 - 9:45 am Best Practices for Thriving in an Ambiguous Cyber World
Christine Vanderpool, CISO, Florida Crystals
10:15 - 11:00 am 5 Things to Know about Open Source Security
Sharon Sharlin, Product Marketing Manager, White Source
11:30 - 12:15 pm Enable Secure Velocity at Scale: DevOps Automation with Identity
Ivan Dwyer, Group Product Marketing Manager, Okta
12:45 - 1:30 pm The High Stakes of CISO Burnout
Jothi Dugar, CISO