Gathering the foremost Cybersecurity Executives from across America, we will be addressing the most prevailing Technology and Leadership challenges encountered within a constantly evolving corporate environment.
Over two and a half days, we will cultivate meaningful connections and confront cybersecurity challenges in an intimate, dynamic setting. Attendees will gain insights from peers through diverse workshops, panels, roundtables, and presentations. Upholding a closed-door policy ensures that all dialogues remain within the confines of the Forum walls, fostering genuine and engaging conversations.
Discover cutting-edge technologies poised to address organizational gaps through tailored one-on-one engagements, strategically scheduled throughout the Forum and chosen based on individual needs.
Forge new connections, nurture existing ones, celebrate successes, and empathize with the shared challenges encountered by fellow Cybersecurity Leaders.
Join us at the F1000 CISO & Security Leaders Forum and depart equipped to inspire actionable change within your organization!
Master of Ceremonies
Michele Chubirka
Staff Cloud Security Advocate
Hotel Van Zandt
Inspired by Austin’s musical roots and rich Texas history, Hotel Van Zandt’s sophisticated rock-and-roll meets your favorite worn-in leather boots. Located in the heart of Austin’s vibrant Rainey Street District, the luxury hotel features a collection of 319 guest rooms and suites, each adorned with musical prints and subtle nods to the city we love while creating a comfortable spot to settle in. Whether you’re visiting for business or a weekend getaway, you’ll enjoy all the Live Music Capital of the World has to offer. From iconic music venues and old-fashioned honky tonks to award-winning culinary, Hotel Van Zandt is your all-access pass to an authentic Austin experience.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda.
2:00 PM - 5:00 PM CT
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM CT
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM CT
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:55 AM CT
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM CT
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:55 AM CT
KEYNOTE PRESENTATION - Enabling the Institution for the Digital Economy: Key Future Trends
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
Presented by: Cyera
9:05 AM - 9:35 AM CT
WORKSHOP - Data Centric Security
For years the security focus of the enterprise was to build a hardened perimeter at the edge of the network, an impenetrable shell that kept the bad out and the good in. Over the last few years, this model has fallen by the wayside. Technologies such as Cloud and Mobility have pushed the enterprise beyond its traditional perimeter while increased levels of partnership have created inroads through that shell. As a result, infrastructure based security is no longer sufficient or appropriate and enterprises everywhere are having to make the shift to a new security paradigm, one that is centered on the data itself, not on the infrastructure that houses it.
Key takeaways:
- Learn the principles of data centric security
- Understand the role encryption plays and how it should be integrated
- Determine when and where data monitoring tools make sense
Presented by: Legit Security
9:45 AM - 10:15 AM CT
WORKSHOP - Increased Focus on AI and Machine Learning in Cybersecurity
This session will explore the transformative impact of AI and machine learning on cybersecurity. Experts will discuss how these technologies enhance threat detection, automate responses, and improve overall security posture. Real-world case studies will be presented, showcasing successful implementations and the challenges faced. Attendees will gain insights into the future landscape of AI-driven cybersecurity and how to leverage these tools to stay ahead of emerging threats.
Presented by: Delinea
10:15 AM - 10:30 AM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:35 AM - 11:05 AM CT
WORKSHOP - Blockchain and Cybersecurity
Blockchain technology offers unique security features that can be leveraged to enhance cybersecurity. This session will explore the intersection of blockchain and cybersecurity, examining how blockchain can improve data integrity, secure transactions, and protect against cyber threats. Experts will discuss real-world applications, potential challenges, and future trends. Attendees will gain insights into how to incorporate blockchain technology into their cybersecurity strategies.
Presented by: Zafran
11:15 AM - 11:45 AM CT
WORKSHOP - Establishing a Best-of-Breed Security Strategy
In the debate over an all-in-one cyber security platform versus best of breed solutions, the overwhelming majority lean towards best of breed in order to leverage the most impactful technology. However, does true best of breed exist? This session will look to explore this debate and how to implement a best of breed strategy when tech doesn’t necessarily integrate with other tech.
11:55 AM - 12:45 PM CT
PANEL - Cybersecurity Insurance Becoming Mainstream
As cyber threats continue to escalate, cybersecurity insurance is becoming an essential component of risk management. This session will cover the basics of cybersecurity insurance, including coverage options, policy requirements, and the claims process. Participants will learn about the benefits and limitations of cybersecurity insurance, how to assess their organization’s risk profile, and best practices for selecting the right coverage. Real-world examples will illustrate the role of insurance in mitigating financial losses from cyber incidents.
12:45 PM - 1:35 PM CT
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, Palates, and preferences. Vegan, vegetarian, halal options available
1:40 PM - 2:10 PM CT
PRESENTATION - Expansion of Remote Work and Cybersecurity Implications
The rise of remote work has brought about new cybersecurity challenges and opportunities. This session will examine the implications of a distributed workforce on an organization’s security infrastructure. Topics will include securing remote access, protecting sensitive data, and mitigating risks associated with home networks and personal devices. Attendees will learn strategies to enhance their remote work security policies and ensure robust protection in a decentralized environment.
Presented by: Dataminr
2:20 PM - 2:50 PM CT
WORKSHOP - The Rise of Quantum Computing and Its Impact on Cybersecurity
Quantum computing promises unprecedented computational power, which could revolutionize many fields, including cybersecurity. This session will explore the potential impacts of quantum computing on current cryptographic methods and cybersecurity measures. Experts will discuss the need for quantum-resistant algorithms, the timeline for quantum advancements, and how organizations can prepare for a quantum future. Attendees will gain a deeper understanding of the challenges and opportunities posed by this emerging technology.
3:00 PM - 3:30 PM CT
WORKSHOP - Risk Management in the Era of AI
This session provides a comprehensive exploration of the challenges and opportunities that arise with the integration of Artificial Intelligence (AI) in various industries. We’ll examine the intricacies of managing risks associated with AI technologies, highlighting the potential pitfalls and benefits they bring. By examining real-world examples and case studies, we’ll shed light on the complexities and ethical considerations involved in harnessing AI’s power while mitigating potential risks.
3:30 PM - 3:45 PM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:50 PM - 4:20 PM CT
WORKSHOP - Driving Past the Data/Privacy Divide
To ensure relevance and competitiveness in today’s customer centric market, enterprises of all types are investing heavily in customer data capture and customer data analytics capabilities. With data being captured from so many new locations and at a deeper and more personal level than ever before privacy issues become more and more important. Enterprises need to constantly review their data capture and usage to determine value vs. risk and whether the incentive offered to the customer is sufficient to overcome any reticence on their part.
This session will address privacy issues, how to balance opt in vs opt out requirements and that Data Privacy certainly isn’t a roadblock to data capture but the customer incentive needs to be sufficient to justify the sharing of personal details.
4:25 PM - 5:15 PM CT
ROUNDTABLE + PANEL: Cybersecurity in the Era of Regulatory Compliance
In an age where regulatory compliance is increasingly complex and stringent, cybersecurity has become a critical focus for organizations worldwide. This session will delve into the intricate relationship between cybersecurity and regulatory compliance, highlighting the latest regulations and standards that organizations must adhere to. Topics will include GDPR, CCPA, HIPAA, and other regional and industry-specific regulations, as well as the implications of non-compliance. Experts will discuss strategies for integrating compliance into cybersecurity frameworks, the role of continuous monitoring, and the importance of maintaining up-to-date documentation and reporting practices. Attendees will learn how to navigate the regulatory landscape, implement best practices, and ensure their cybersecurity measures align with legal requirements to protect both their data and their reputation.
6:00 PM - 7:00 PM CT
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM CT
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM CT
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM CT
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
10:00 AM - 10:30 AM CT
PRESENTATION - Navigating the Evolution of Cybersecurity: AI's Role in Securing Your Infrastructure from Past to Future
In the ever-evolving landscape of cybersecurity, staying ahead of threats is imperative. As we reflect on the past, embrace the present, and prepare for the future, the integration of artificial intelligence (AI) into security infrastructure has emerged as a disruptive technology in safeguarding digital assets. Join us at this exclusive event led by Trend Micro as we delve into the dynamic journey of AI’s impact on cybersecurity. From historical insights to current advancements and future projections, discover how AI is reshaping the defense mechanisms against cyber threats, fortifying your infrastructure, and empowering organizations to navigate the digital frontier with confidence.
Presented by: Trend Micro
10:30 AM - 10:45 AM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM CT
WORKSHOP - Zero Trust Security
The Zero Trust security model, which assumes no implicit trust within or outside an organization’s network, is gaining traction. This session will explore the principles of Zero Trust, its implementation challenges, and the benefits it offers. Participants will learn about key components such as micro-segmentation, continuous verification, and least-privilege access. Case studies will demonstrate successful Zero Trust deployments, providing practical insights for organizations looking to adopt this approach.
11:30 AM - 12:00 AM CT
PRESENTATION - Cybersecurity Skills Gap and Education
The growing demand for cybersecurity professionals has highlighted a significant skills gap in the industry. This session will discuss the current state of cybersecurity education, the challenges in developing a skilled workforce, and strategies to bridge the gap. Topics will include training programs, certifications, and partnerships between academia and industry. Attendees will learn about initiatives to attract and retain cybersecurity talent and how to cultivate a culture of continuous learning within their organizations.
12:00 PM - 1:00 PM CT
SINC NETWORKING LUNCH
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- diamond Sponsor
- platinum Sponsor
- gold Sponsor
diamond
Cyera
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.
Learn Morediamond
Trend Micro
We’re a global cybersecurity leader, helping to make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints.
As a leader in cloud and enterprise cybersecurity, our platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response.
Learn Moreplatinum
Dataminr
Dataminr puts real-time AI and public data to work for our clients, generating relevant and actionable alerts for global corporations, public sector agencies, newsrooms, and NGOs. Our leading AI platform detects the earliest signals of high-impact events and emerging risks from hundreds of thousands of public data sources. Our real-time alerts enable tens of thousands of users at hundreds of public and private sector organizations across the globe to learn first of breaking events around the world, develop effective risk mitigation strategies, and respond with confidence as crises unfold.
Learn Moregold
Legit Security
Legit Security provides an application security posture management platform that secures application delivery from code to cloud and protects an organization’s software supply chain from attack.
Our enterprise-grade platform helps CISOs, application security and development teams successfully defend against the latest threats to your pre-production development environments and helps ensure governance, compliance, and integrity for every software release. The platform’s ability to auto-discover, analyze and secure from code-to-cloud in a single platform enables it to contextualize security risks, consolidate vulnerability management, and prioritize remediation so that AppSec programs can keep their businesses safe while releasing software fast.
More from Legit Security:
Modernizing Application Security to Scale for Cloud-native Development
A New Approach to Application Security
Learn More
gold
Delinea
Delinea is a pioneer in securing identities through centralized authorization, making organizations more secure by seamlessly governing their interactions across the modern enterprise.
Delinea allows organizations to apply context and intelligence throughout the identity lifecycle across cloud and traditional infrastructure, data, and SaaS applications to eliminate identity-related threats.
With intelligent authorization for all identities, Delinea is the only platform that enables you to identify each user, assign appropriate access levels, monitor interaction across the modern enterprise, and immediately respond upon detecting any irregularities.
The Delinea Platform enables your teams to accelerate adoption and be more productive by deploying in weeks, not months, and requiring 10% of the resources to manage compared to the nearest competitor.
Learn Moregold
Zafran
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Learn More