East IT & Security Leaders Forum Agenda

Meet the SINC team, receive all your registration collateral and receive a demonstration on how to best utilize the Forum mobile application during your attendance.

By: Isaac Sacolick, Founder of StarCIO, Author, and Digital Transformation Influencer

Driving Digital by Isaac Sacolick

Attack. Detect. Respond. Know where you stand to prevent the next attack.

Our technology is vulnerable but the solution is not more technology. Security is all about the people, process, and technology. In this session we will discuss how understanding and emulating attacks in your organization can help improve, and hopefully prevent, the next attack as you train and improve your people, process, and technology.

Speaker: Bryson Bort, Founder of SCYTHE

 

Fuel-up and prepare for a day packed full of content and conversations.

SINC kicks things off and sets the tone for the day with insight in to the various sessions taking place and how to take full advantage of your participation.

Continuously Protect Active Directory from Attacks with ADAssessor and ADSecure

Microsoft Active Directory (AD) is the primary source of information for all enterprise resources and seamlessly integrates business applications, which is the reason it is a high-value target for adversaries.

Attivo Networks ADAssessor and ADSecure solutions provide security teams with the ability to prevent attackers from leveraging AD. These solutions protect without interfering with production AD operations, requiring logs, or complex permissions management.

Join us and learn how to:

  • Detect and prevent real-time attacks against AD.
  • Gain unprecedented visibility to exposures that lead to lateral movement, dangerous and easily exploitable delegation and bulk changes to AD.
  • Reduce your attack surface by identifying and eliminating excess and unneeded identity privileges.
  • Understand how to hide your critical accounts from unintended eyes, delivering misinformation to attackers to slow their progress.

Speaker: Matthew Parker, VP Attivo Networks

Presented by: Attivo Networks

Attivo Networks

The Next Generation of Cyber Security: Autonomous Cyber AI with Darktrace

Our digital environments and workforces are more dynamic than ever. To navigate the risks and challenges that digital innovation brings, organizations must rethink their approach to security. Static, legacy approaches have become redundant against sophisticated, fast-moving threats, and attackers that continue to evolve their techniques. Organizations are increasingly turning to new technologies like AI to achieve much-needed adaptability and resilience; protecting workforces and data from attack by detecting, investigating and responding to cyber-threats in real time — wherever they strike.

Presented by Darktrace

Darktrace

SUNBURST was a game-changing moment for cybersecurity, proving without a doubt that threats have become advanced and sophisticated. A reliance on prevention alone is insufficient when the adversary is already hiding within your business, plotting their next move. This is your opportunity to fight back.
In a post-compromise world, your greatest chance at stopping a breach is with network detection & response (NDR)

Presented by: Extra Hop

ExtraHop

Choose One Topic Per Session

  1. Managing Up: Board/Directors relationship management 
  2. Managing a Virtual Workforce
  3. Information Security Roadmaps: How much planning and protection is enough?
  4. On Prem vs. Cloud: If it ain’t broke should we still fix it?
  5. Ransomware & Securing Your Environment
  6. Cyber Gaps: Every organization is now a technology organization
  7. Business Strategy and the changing role of the CIO
  8. Empathy in the Workplace: What have we learned from COVID-19?
  9. What worked for your company, actually, practically, and testifiably?
  10. What is your strategy behind the technology or product – why this solution over that one?

With a growing talent crisis, a pandemic slowing and return to office plans accelerating, organizations are expected to face more complex talent challenges. In a hybrid workplace, individuals gain more flexibility on choosing who to work for or where to work from. You will face hiring ‘enough’ or ‘the right talent’, and the approach must continue to evolve while speeding down a runway. Let’s hear from a panel of your peers on how each is preparing for and mitigating People Risk in ways that blend innovation, tenacity, and sustainability for cyber and technology talent acquisition… without the “silly” money. 

Moderator: Reiner Moquete, Founder & CEO, CyberWarrior Academy

Tech Trends 2022

Businesses responded to the global pandemic by accelerating digital transformation, creating an unprecedented need for IT to drive value. As the world enters into an uncertain post-pandemic era, asserting relevance in the digital economy is the minimum requirement to continue business growth – and perhaps survival. In our Tech Trends 2022 report, we’re focusing on how CIOs can enable their CEOs to thrive through five key enablers of the digital economy: connectivity, access, intangible markets, sustainability, and automation. We explore the emerging technologies involved and compelling use cases for CIOs that are ready to innovate.

Speaker: Janice Clatterbuck, Executive Counselor, Info-Tech

Presented by: Info-Tech

Cyber Resilience: Being Resilient when cyber disruption occurs

Cyber-resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to adapt to customer changes, digital transformation, and hyper-scaled growth.

Learn how to enable cyber resilience within your enterprise to ensure that when the inevitable cyber disruption occurs, stakeholders know that there is a well-thought-out and practiced cyber-resilience plan in place to help ensure the organization can survive and thrive during turbulent times.

We will cover the main goals of being cyber resilient:

– Anticipating disruptionWithstanding attacks

– Automation, machine learning, and adaptive cyber-threat detection

– Recovering rapidly

– Adapting to an evolving threat landscape

Speaker: Stan Wisseman, Chief Security Strategist for CyberRes (A Micro Focus Line of Business), CyberRes

Presented by: CyberRes

CyberRes

Implementing Transformation as a Service: Envisioning a Model for Digital Scalability

Digital transformation: In the past we’ve talked about innovation and what that needs to look like. But how do we continue to bring transformation into our operations on a daily basis, and how do we implement that into our innovation cycles? How do we continue to drive the business forward? 

The new model wherein organizations must be remote, distributed, and yet still connected will swiftly bring to light how quickly we can continue to productize and digitize our services, and to bring outcomes and solutions to the market. But we often don’t have a clear definition or a full understanding of exactly what the transformation as a service model is. In other words, what does a dynamic transformation as-a-service type of model look like across any industry? 

This will be the focus of my remarks and serve as a starting point for dialogue in this full audience session. We’ll get some dynamic discussion going in the room, as every industry and every vertical within it can offer unique insights and contributions. We don’t know where we will be in the next 12 months, 18 months—guesstimating and gauging is a hallmark feature of this new COVID era—making shared peer experience and industry communication even more essential. 

Some questions we’ll consider: 

  • Cloud made possible the moonshot approach by virtue of the emergency issues we faced with last year, but cloud is just the beginning–where do we go from here? 
  • With the AWSs and the Azures and the GCPs, we’re out of the data centers, we’re fully cloud enabled. How do we leverage these cloud native environments to continue to provide the scalability and elasticity that we need to drive innovation? 
  • How do we bring the transformation-as-a-service model to our products, services, platforms, and solutions?

Speaker: Dr. Arlene Espinal, Independent Corporate Advisor (previously VP Artificial Intelligence, Analytics & Automation, ManTech)

Choose One Topic Per Session

  1. Managing Up: Board/Directors relationship management 
  2. Managing a Virtual Workforce
  3. Information Security Roadmaps: How much planning and protection is enough?
  4. On Prem vs. Cloud: If it ain’t broke should we still fix it?
  5. Ransomware & Securing Your Environment
  6. Cyber Gaps: Every organization is now a technology organization
  7. Business Strategy and the changing role of the CIO
  8. Empathy in the Workplace: What have we learned from COVID-19?
  9. What worked for your company, actually, practically, and testifiably?
  10. What is your strategy behind the technology or product – why this solution over that one?

Are we heading into a post-COVID digital transformation 2.0? The first-gen of digital transformation was driven by investing in customer experiences, becoming data-driven, and migrating to cloud architectures while the organization learned agile, DevOps, and data science capabilities. Digital transformation’s next-gen will be driven by digitally enabled products, hybrid working, proactive data governance, integrated employee experiences, and AI-inside security and operations. Hear from Isaac Sacolick, author of the bestselling Driving Digital and President of StarCIO, on five technologies that are key to digitally transforming the organization.

Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO / CDO, Digital Transformation Influencer

Driving Digital by Isaac Sacolick

Data Security: How to manage security around your critical data

Fuel-up and prepare for a day packed full of content and conversations.

End of Day

Interested in speaking?
Please submit a request below.