Register Here
Collaborative Agenda April 27th, 2023
11:30 - 12:30 PM CST
NETWORKING LUNCH
Open seating buffet meal serving 5-star food and great Peer engagement before we kick off the day
12:35 - 12:40 PM CST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day! A brief rundown of the session format, App overview and how to win some great prizes
12:40 - 1:10 PM CST
MASTER OF CEREMONIES KEYNOTE PRESENTATION - Preparing IT & Cybersecurity Strategies and Budgets for a Volatile 2023
With many economists are anticipating a recession in 2023, the impact on IT departments is unclear. One would expect companies to pull back across the board and for those cuts to include IT. But the big surprise is that spending on IT is expected to increase.
That said, decision makers will be quick to slash frivolous spending and non-essential tech stacks.
1:20 - 1:50 PM CST
WORKSHOP - Security Validation as the Heart of Exposure Management
To increase security readiness given today’s dynamic attack surfaces and diverse cyberthreats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments.
Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary’s view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls.
During this session, we will present a pragmatic approach to implementing an Exposure Management strategy, focusing on automated security validation.
Presented by: Pentera
2:00 - 2:30 PM CST
WORKSHOP - Cloud Defense in Depth: Shift Left, and Shield Right
Cloud security grows increasingly complex. The types of solutions, the vendors, the promises, and the jargon around cloud security continue to grow in an already crowded market. But with all of these offerings, the attacks aren’t decreasing. The business benefits of the cloud are clear: flexibility, scalability, and innovation at speed- one of the last true competitive differentiators – but how do you protect your business, and keep the risks from outweighing the benefits? A defense in depth strategy enables organizations to innovate and scale confidently and security. Join SentinelOne’s Laura Roantree, to explore the anatomy of a real cloud ransomware attack, and how a pragmatic defense in depth strategy will help you resist, and recover.
Speaker: Laura Roantree, Director of Cloud Security MarketingDirector, SentinelOne
Presented by: SentinelOne
2:30 - 2:45 PM CST
REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
2:50 - 3:40 PM CST
INTERACTIVE ROUNDTABLE - Driving the Business Through Technology
Organizations are losing productivity from managing the limitations of yesterday’s technology. The business is changing and the current communications solution no longer adequately connects end users. Old communications technology, including legacy telephony systems, disjointed messaging and communication or collaboration mediums, and unintuitive video conferencing, deteriorates the ability of users to work together in a productive manner.
This session will cover:
- What does your Organizations Communication Infrastructure look like?
- Is there a plan in place to move from legacy systems? If so, what does that plan look like?
- How do you gain the business buy-in for the updating of technologies that doesn’t necessarily equate with directly driving revenue?
For the first 30 minutes of this session, we will be grouped in roundtables (10-12 Executives/table) with one table monitor. The last 20 minutes, each table monitor will take to the stage and discuss their group’s findings in a panel recap.
Panelist: David Beaver, IT Director, Kriete Group
3:45 - 4:15 PM CST
WORKSHOP
4:15 - 4:25 PM CST
REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
4:30 - 5:20 PM CST
INTERACTIVE ROUNDTABLE - Siloed in Cyber
Siloed security data hampers the ability for Organizations to achieve a collective defense. According to a 2022 Forrester study, 71% of security leaders report their teams need access to threat intelligence, security operations data, incident response data, and vulnerability data, yet 65% of respondents find it very challenging to provide security teams with cohesive data access.
With today’s evolving threats, security operations teams cannot succeed without the access to and a centralized view of the data from other cyber and IT applications within their environments.
This session will cover:
- How is your Organization implementing a unified security strategy?
- What are some best practices for a stronger security strategy?
- How do you determine exactly what intelligence is required and how you can apply it to your business?
For the first 30 minutes of this session we will be grouped in roundtables (10-12 Executives/table) with one table monitor. The last 20 minutes, each table monitor will take to the stage and discuss their group’s findings in a panel recap.
Moderator: Bill Slater, CISO, Slater Technologies
Panelists:
Jonathan Reiber, Vice President for Cybersecurity Strategy and Policy, AttackIQ
DigiCert
5:20 - 7:00 PM CST
COCKTAIL & CANAPE NETWORKING RECEPTION
Stick around, avoid the traffic and mingle with your peers! Open bar and serving a few finger foods to hold you over
Forum Sponsors
- platinum Sponsor
- gold Sponsor

platinum
Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
Learn More
platinum
SentinelOne
SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation, and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks.
More from SentinelOne
Stingray Accelerates Its Security Response Times with SentinelOne on AWS
Learn More
platinum
CrowdStrike
CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Learn More
gold
AttackIQ
AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with the MITRE Engenuity.
Learn More
gold
DigiCert
DigiCert is the digital trust provider of choice for leading companies around the globe, enabling individuals, businesses, governments, and consortia to engage online with confidence, knowing their digital footprint is secure.
Learn More