By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the Central IT & Security Leaders Forum and leave ready to inspire action within your Organization!
Hyatt Regency Lost Pines Resort and Spa
Find your perfect Texas escape at Hyatt Regency Lost Pines Resort and Spa. Splash the day away and float in the lazy river at Lost Pines Water Park. Hit the greens at the award-winning 18-hole golf course. Test your skills at archery or explore Renegade Trailhead on horseback. Whether you’re seeking rest and rejuvenation at the full-service spa, quality time with the family while roasting s’mores at the firepits or delectable dining at the onsite restaurants there’s something for everyone at Hill Country resort.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda
2:00 PM - 5:00 PM CT
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM CT
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM CT
SINC NETWORKING & ENGAGEMENT DINNER
7:30 AM - 8:25 AM CT
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:30 AM - 8:35 AM CT
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:35 AM - 9:25 AM CT
PANEL - Enabling the Institution for the Digital Economy: Key Future Trends
As the digital economy continues to expand, institutions must adapt to remain competitive and relevant. This session will explore the key trends shaping the future of the digital economy and how institutions can effectively enable their digital transformation. Topics will include advancements in digital infrastructure, the integration of artificial intelligence and machine learning, the importance of data analytics, and the shift towards digital-first business models. Experts will discuss the challenges and opportunities presented by these trends, providing practical insights on how institutions can leverage technology to enhance efficiency, innovation, and customer engagement. Attendees will gain a comprehensive understanding of the strategic steps necessary to thrive in the digital economy.
9:35 AM - 10:05 AM CT
WORKSHOP 1 - Data Centric Security
For years the security focus of the enterprise was to build a hardened perimeter at the edge of the network, an impenetrable shell that kept the bad out and the good in. Over the last few years, this model has fallen by the wayside. Technologies such as Cloud and Mobility have pushed the enterprise beyond its traditional perimeter while increased levels of partnership have created inroads through that shell. As a result, infrastructure-based security is no longer sufficient or appropriate and enterprises everywhere are having to make the shift to a new security paradigm, one that is centered on the data itself, not on the infrastructure that houses it.
Key takeaways:
- Learn the principles of data-centric security
- Understand the role encryption plays and how it should be integrated
- Determine when and where data monitoring tools make sense
9:35 AM - 10:05 AM CT
WORKSHOP 2 - Achieving Next-Gen Business Outcomes with IoT & Blockchain
Learn how to harness decentralized technologies to tranform your business. Understand how IoT & Blockchain work together to ensure security, transactional integrity, while reducing total cost of operations to near zero. During this session, you’ll engage in the process of building a Decentralized Autonomous Organization- brining the pieces together to provide a foundation to understand opportunities & risks as your organization drives to Next-Gen business.
10:15 AM - 10:45 AM CT
WORKSHOP 1 - Redefining Data Protection: Building Resilient and Secure Strategies for Modern Threats
This session will explore foundational and advanced strategies to safeguard data across diverse environments, including hybrid and multi-cloud settings. Topics will cover approaches to data security, compliance, threat detection, disaster recovery, and innovative techniques to mitigate risks such as ransomware and misconfigurations. Attendees will gain actionable insights into building resilient systems to protect critical information assets and ensure operational continuity in today’s dynamic landscape.
10:15 AM - 10:45 AM CT
WORKSHOP 2 - Not Your Grandparent's AI: New Age of Cybersecurity and IT Management
Join us for an engaging and insightful journey through the evolution of AI, from the pioneering days of Turing to today’s cutting-edge generative models. In “Not Your Grandparent’s AI: New Age of Cybersecurity and IT Management,” we explore how AI is revolutionizing IT operations and cybersecurity, transforming our approaches to data analysis, threat detection, and endpoint management. We’ll delve into the emotional rollercoaster of technology adoption, address the new risks posed by generative AI, and discuss how to balance the need for speed and real-time data with security imperatives. This talk will equip you with a deeper understanding of the current landscape and future trajectory of AI in our industry. Come discover how to harness AI’s potential while navigating its challenges.
Presented by: Tanium
10:45 AM - 11:00 AM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
11:05 AM - 11:35 AM CT
WORKSHOP 1 - Driving Past the Data/Privacy Divide
To ensure relevance and competitiveness in today’s customer centric market, enterprises of all types are investing heavily in customer data capture and customer data analytics capabilities. With data being captured from so many new locations and at a deeper and more personal level than ever before privacy issues become more and more important. Enterprises need to constantly review their data capture and usage to determine value vs. risk and whether the incentive offered to the customer is sufficient to overcome any reticence on their part. This session will address privacy issues, how to balance opt in vs opt out requirements and that Data Privacy certainly isn’t a roadblock to data capture but the customer incentive needs to be sufficient to justify the sharing of personal details.
11:05 AM - 11:35 AM CT
WORKSHOP 2 - Building The 'True' Software-Defined Data Centers
The software-defined data center (SDDC) is a concept in which all data center infrastructure is virtualized and delivered as a service. Control is fully automated through software, allowing hardware configuration to be maintained through automated policies. SDDC advances virtualization and cloud computing by supporting both legacy enterprise applications and new cloud computing services. It thus provides a solid base for using public, private, and hybrid clouds. By abstracting applications from hardware, SDDC allows apps to run anywhere and even move from place to place. It also allows for greater automation within a data center and faster, simple orchestration across centers.
11:45 AM - 12:15 PM CT
PRESENTATION - Using AI to Enhance Customer and Employee Journeys
In today’s dynamic business environment, companies face the imperative of delivering instant answers and assistance to customers engaging with digital channels. This informative discussion addresses the vital elements needed to produce tangible results to meet this demand. While AI tools and smart agents can minimize human intervention, professionals across sales, marketing, and customer service must navigate customer interactions and team collaboration in new ways. In this chat we will address the challenges to be aware of in the strategic deployment of these technologies and steps to take to ensure they deliver expected value.
Presented by: RingCentral
12:25 PM - 1:15 PM CT
PANEL - The CIO's Role in the Future of Work
As organizations adapt to technological advancements, remote collaboration tools, and changing workforce dynamics, the CIO emerges as a key strategist, orchestrating digital transformation initiatives and ensuring seamless integration of technology into the fabric of the modern workplace. This Panel will discuss how CIOs can drive innovation, enhance cybersecurity measures, and foster a flexible and inclusive work environment to meet the challenges and opportunities presented by the future of work.
1:15 PM - 2:05 PM CT
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, palates, and preferences. Vegan, vegetarian, halal options available
2:10 PM - 2:40 PM CT
WORKSHOP 1 - The Rise of Autonomous IT: Managing Systems That Manage Themselves
Self-healing networks, AI-driven systems optimization, and autonomous IT are redefining how infrastructure is managed. This session explores the leadership challenges of transitioning from manual oversight to autonomous operations. Learn how to govern intelligent systems, balance autonomy with accountability, and prepare your teams for this radical shift.
2:10 PM - 2:40 PM CT
WORKSHOP 2 - Post-Cloud IT: What Comes After the Cloud Revolution?
As cloud adoption matures, what’s next for IT infrastructure? This session explores the rise of distributed computing paradigms like fog, mist, and edge clouds. Leaders will gain insights into preparing for a post-cloud era where decentralized architectures, hyper-local processing, and multi-cloud strategies dominate.
2:50 PM - 3:20 PM CT
WORKSHOP 1 - Enhancing SaaS Security: Advanced Detection and Response Strategies with SaaS Security Posture Management (SSPM) to Protect Against Misconfigurations and Emerging Threats
With the growing reliance on SaaS applications, misconfigurations and emerging threats pose significant risks to your cloud environment. This session will dive into how SaaS Security Posture Management (SSPM) can provide advanced detection and response strategies to identify vulnerabilities, secure configurations, and respond to threats in real-time. Join us to gain actionable insights into strengthening your SaaS security posture and protecting your organization’s critical data.
2:50 PM - 3:20 PM CT
WORKSHOP 2 - The Future of Digital Identity: Building Secure, Scalable Systems
As digital identity becomes a central piece of online interactions, leaders must ensure that identity management systems are both secure and scalable. This session explores the evolving landscape of digital identity, including biometrics, decentralized identity management, and the role of blockchain. Learn how to build a robust identity management strategy that can evolve with technological advancements and security threats.
3:30 PM - 4:00 PM CT
WORKSHOP 1 - Risk Management in the Era of AI
This session provides a comprehensive exploration of the challenges and opportunities that arise with the integration of Artificial Intelligence (AI) in various industries. We’ll examine the intricacies of managing risks associated with AI technologies, highlighting the potential pitfalls and benefits they bring. By examining real-world examples and case studies, we’ll shed light on the complexities and ethical considerations involved in harnessing AI’s power while mitigating potential risks.
3:30 PM - 4:00 PM CT
WORKSHOP 2 - Hiring and Retaining top IT & Security Talent
While the pool of talented cybersecurity professionals is increasing daily, there is still a shortage of cybersecurity professionals to go around. This sessions will dicuss how your organization can stand out from the crowd and attract the best. The session will cover the following topics: – How being an active CISO and Thought Leader is the best marketing for new talent – Creative ways to compete and assets that are important outside of salary – Increase training and access to non-cybersecurity experts that are already excelling at your company and how to determine that talent you already have in house.
4:00 PM - 4:15 PM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
4:20 PM - 4:50 PM CT
WORKSHOP 1 - Challenges with Digital Currency: Enabling the Institution for the Digital Economy
The world now depends on the digital economy. IT is central to the organization’s successful response and there are four pillars of strength required: re-coding the institutional DNA, treating security as survival, responding to the new relationship with work, and reducing the bureaucratic burden.
4:20 PM - 4:50 PM CT
WORKSHOP 2 - The Cybersecurity Metaverse: Securing Virtual Worlds
As organizations explore the metaverse for new business opportunities, IT and cybersecurity leaders face the challenge of securing assets in immersive, virtual environments. This session dives into safeguarding virtual identities, protecting digital assets, and ensuring privacy in the metaverse. Attendees will uncover strategies for combating new threat vectors in a space where physical and digital realities blend seamlessly.
5:00 PM - 5:30 PM CT
WORKSHOP 1 - Diving into Talent Acquisition, Diversity and Retention
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough woman and minorities in to the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us as we dive into solutions to tackle the following challenges:
- How do you scale staff / team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought – Old vs New Thinking?
- How do we mentor universities to implement actionable steps for supplying more IT talent?
5:00 PM - 5:30 PM CT
WORKSHOP 2 - Is Your Roadmap Business-Driven or Vendor Dictated?
Today, the primary CEO priority is growth, with technology as a key enabler. However, vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business. Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor’s. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.
6:00 PM - 7:00 PM CT
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM CT
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM CT
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM CT
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
10:00 AM - 10:30 AM CT
WORKSHOP - A Data Driven Journey: Insights and Lessons Learned
Everyone’s journey to being data-driven is unique. It’s like making an apple pie. It’s easy to get the ingredients, but you need to know how to put together the right recipe for a great apple pie. In this interactive discussion I will share insights and lessons learned in leading data modernization initiatives and in sharing the journey with customers. Data literacy, culture, governance, quality, technology stack modernization and architecture are all ingredients in driving towards the right data driven recipe. The discussion will include tips and tricks for reducing friction points and how to build the right recipe for your organization.
10:30 AM - 10:45 AM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM CT
WORKSHOP - From On-Prem to the Cloud: Protect Your Apps and APIs
The result of digital transformation: It’s easier to do business with your customers and partners. But with new architectures, web apps and APIs now deployed from on-prem servers to the cloud, it is harder than ever to get a holistic view of all of these potentially vulnerable assets – never mind defend them.
What are your biggest challenges today in defending these diverse assets? What are the known gaps in your current defenses? What are you seeking in the future to defend your apps and APIs?
Topics covered will include:
- How are adversaries preying upon unprotected web apps and APIs?
- How are traditional web application firewalls deployed, and what are they missing?
- What does the future look like with unified web app and API security solutions?
11:30 AM - 12:00 PM CT
WORKSHOP - Maximizing Value Vs Minimizing Cost - Building a more Valuable IT Department
To meet the speed and agility demands of digital business, CIOs are transforming their IT departments and shifting a growing share of IT work from projects to products. At the same time, growth in business-led IT has expanded the span of employees across the enterprise who are responsible for technology initiatives.
This session will explore a cost management model and discuss how evolving IT cost management efforts to focus on value over pure cost will reduce (and even eliminate) reactive calls to cut IT costs. This session will provide a model and tactics to elevate the maturity of IT to focus on value over costs, while still meeting the business directives.
12:00 PM - 1:00 PM CT
SINC NETWORKING LUNCH
Central Executive Advisory Council
Lucy Mariappa
2023 CIO of the Year
Radhika Murudeshwar
Director Enterprise Architecture - Clinical
UnitedHealth Group
Ross Tucker
CIO
Texas United Management Corporation
Dana Prochaska
Executive Security Advisor / vCISO
Freelance
Jeff Baker
CIO
NB Business Solutions
Rusty Kennington
CIO
Henry Company
Sudhakar Virupakshi
CIO
Buckeye Partners
Robert Pace
CISO
Invitation Homes
Shivani Agarwal
Head of IT
McLane Company
Tod Huber
CTO
Milwaukee County
Bhadresh Patel
Chief Technology Officer
Humana
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
platinum
RingCentral
RingCentral is a global leader in AI-powered trusted business communications, contact center, revenue intelligence, video and hybrid event solutions. RingCentral empowers businesses with conversation intelligence and unlocks rich customer and employee interactions to provide insights and improved business outcomes. With decades of expertise in reliable and secure cloud communications, RingCentral has earned the trust of hundreds of thousands of customers and millions of users worldwide.
Learn Moregold
Tanium
Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium unifies teams and workflows and protects every endpoint from cyber threats by integrating IT, Operations, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale.
Learn More