By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the West IT & Security Leaders Forum and leave ready to inspire action within your Organization!
Master of Ceremonies
Shawnna DelHierro
Chief Technology Officer, STG Consulting
Senior Advisor & Executive Consultant
Connect With Me!
Sheraton Grand at Wild Horse Pass
Enjoy seamless travel in Phoenix, Arizona, at Sheraton Grand at Wild Horse Pass. The luxury Wild Horse resort is 17 miles from Phoenix Zoo and 11 miles from Phoenix Sky Harbor International Airport (PHX), acting as the perfect gateway to Arizona attractions. Browse premium outlets, test your luck at Wild Horse Pass Casino, or adventure into two championship golf courses designed by renowned golf architect Gary Panks and feature original challenges with scenic desert vistas.
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 PM - 5:00 PM MST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM MST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM MST
SINC NETWORKING & ENGAGEMENT DINNER
7:30 AM - 8:25 AM MST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:30 AM - 8:35 AM MST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:35 AM - 9:25 AM MST
PANEL - Enabling the Institution for the Digital Economy: Key Future Trends
As the digital economy continues to expand, institutions must adapt to remain competitive and relevant. This session will explore the key trends shaping the future of the digital economy and how institutions can effectively enable their digital transformation. Topics will include advancements in digital infrastructure, the integration of artificial intelligence and machine learning, the importance of data analytics, and the shift towards digital-first business models. Experts will discuss the challenges and opportunities presented by these trends, providing practical insights on how institutions can leverage technology to enhance efficiency, innovation, and customer engagement. Attendees will gain a comprehensive understanding of the strategic steps necessary to thrive in the digital economy.
Moderator: Shawnna DelHierro, Chief Technology Officer, STG Consulting
Senior Advisor & Executive Consultant
Panelists:
Jack Satterfield, CTO, Pima Community College
Mary Lorkowski, Global Director, IT Infrastructure and Unified Collaboration, Dyno Nobel
Rob Strickland, Interim CIO, InfoVista
9:35 AM - 10:05 AM MST
WORKSHOP 1 - Redefining Cloud, Data, and Network Security to Apply Zero Trust Architecture
The overall business transition to the Cloud is happening far faster than many experts predicted. That speed has left most companies reliant on security platforms built for a bygone world dominated by on-premises data centers. The covid pandemic further accelerated and complicated the situation, stressing CISOs and CIOs who are responsible for protecting a work-from-home staff that may not ever fully return to the office. Organizations are rapidly adopting SASE to safeguard data wherever it moves, support digital transformation efforts, and realize better efficiency and ROI from their technology. Come hear how Netskope’s converged SASE platform provides AI-driven zero trust security and simplified, optimized connectivity to any network location or device, including IoT.
Speaker: Damian Chung, Business Information Security Officer, Netskope
Presented by: Netskope
9:35 AM - 10:05 AM MST
WORKSHOP 2 - Hey, Blue Teams: Stop Waiting for Pen Tests to Find Gaps. It’s Time to Take Control of Your Offensive Testing
It’s 2024 – why do you still rely on manual pen testing to validate your security posture? It’s labor-intensive, doesn’t reveal real-time vulnerabilities at scale, and typically happens only once or twice a year. This lack of automation combined with infrequent testing windows makes it impossible to have a clear and up-to-date understanding of the high-risk attack paths, vulnerabilities and misconfigurations happening inside your IT environment right now.
There’s got to be a better way. And there is. But first, it’s time to stop waiting for Red Teams to take the first step when it comes to validating an organization’s security posture. Blue Teams can take matters into their own hands. By using their own managed security controls, they can do things like create rules in their EDR and WAF to block exploitation attempts from a known vulnerability.
In this session, we’ll talk about the benefits and practical application of automatic, continuous security control testing. And how shifting the power dynamic between Blue and Red Teams can lead to a more optimized approach to security. One that can be automatically built into an existing environment and yield results such as automated testing, continuous validation and coverage at scale.
Finally, we will show real-world examples of threats vs. actual attack paths, vulnerabilities vs. controls, and practical steps to remediation.
Session highlights:
- The problem with traditional pen-testing (it’s expensive, not accurate and can no longer stand alone) and a look at common offensive testing tools.
- Overview of different approaches to continuous offensive testing and security validation (BAS, PTAAS) including advantages and limitations.
- A blueprint and best practices for Blue Teams to take control and optimize their approach to security.
- How continuous testing tools, like BAS, can help with compliance as regulations, standards and requirements become more stringent.
- Examples of real-world exploitations, attack paths and control gaps – and how to solve them.
Speaker: Brian Moran, Sr. Director of Product Marketing, Cymulate
Presented by: Cymulate
10:15 AM - 10:45 AM MST
WORKSHOP 1 - Identity: The New Perimeter and Key to Security Success
In today’s digital landscape, the traditional network perimeter has dissolved. Identity has emerged as the new security perimeter, representing the most critical attack surface for adversaries. As organizations increasingly adopt cloud-based services, remote workforces, and interconnected applications, managing identities and Identity Providers (IDPs) has become central to ensuring security. However, these same identities are also being targeted, manipulated, and abused by cybercriminals to gain unauthorized access to valuable data and resources.
This session will explore the evolving role of identity in cybersecurity, providing a deep dive into how identities and IDPs are leveraged—both legitimately and maliciously. Attendees will gain a comprehensive understanding of the Zero Trust model and why it is essential for today’s security strategy. We will discuss common security failures, such as over privileged access, poor password hygiene, and inadequate monitoring, and identify tools and best practices that can help organizations strengthen their identity security posture.
Participants will walk away with actionable insights on how to better protect identities, implement effective Zero Trust principles, and adopt identity-focused security strategies that mitigate risks in an ever-evolving threat environment. Armed with these best practices, security leaders will be well-equipped to build resilient defenses against today’s most sophisticated cyber threats.
Speaker: Patrick Ramseier, Global Security Specialist Engineering, Tenable
Presented by: Tenable
10:15 AM - 10:45 AM MST
WORKSHOP 2 - Transforming DevSecOps: Innovations in AI-Powered Observability and Security
Join us as we explore cutting-edge strategies for modernizing infrastructure and applications. In this discussion, we delve into the intersection of AI-powered observability security, emphasizing how organizations can enhance their operations, ensure data protection, and comply with regulations. We will discuss the transformative potential of AI, including Generative AI, in boosting overall productivity.
Speaker: Asad Ali, VP of our Global Center of Excellence, Dynatrace
Presented by: Dynatrace
10:45 AM - 11:0 AM MST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
11:05 AM - 11:35 AM MST
WORKSHOP - AI Vs AI - How Security Teams and Adversaries Use AI
As most recent studies have confirmed, adversaries are using AI to improve their tactics to launch targeted cyberattacks on organizations. This talk will analyze how Adversaries are using AI in their attack methods and what has changed from before, in their operations. The second part of the session will delve into how security teams can leverage AI to counterattack threat actors and use AI to build and improve their defenses.
Speaker: Mani Keerthi Nagothu, Americas Field CISO Associate Director, SentinelOne
Presented by: SentinelOne
11:45 AM - 12:15 PM MST
WORKSHOP - Mitigating Vulnerability and Exposure Risk at Enterprise Scale
Attend this session to learn how enterprise cyber security teams reduce cyber exposure and vulnerability risk across all attack surfaces.
Speaker: Tal Morgenstern, Co-Founder & CSO, Vulcan
Presented by: Vulcan
12:25 PM - 1:15 PM MST
PANEL - The CIO's Role in the Future of Work
As organizations adapt to technological advancements, remote collaboration tools, and changing workforce dynamics, the CIO emerges as a key strategist, orchestrating digital transformation initiatives and ensuring seamless integration of technology into the fabric of the modern workplace. This Panel will discuss how CIOs can drive innovation, enhance cybersecurity measures, and foster a flexible and inclusive work environment to meet the challenges and opportunities presented by the future of work.
Moderator: Shawnna DelHierro, Master of Ceremonies
Panelists:
John Jiang, CTO, VESS
Jason Frame, CIO, Southern Nevada Health District
Rob Strickland, Interim CIO, InfoVista
Scott Wibirt, Global Supply Chain – Chief Security Architect, Costco Wholesale
1:15 PM - 2:05 PM MST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available
2:10 PM - 2:40 PM MST
PRESENTATION - Mitigate Risk in the Age of AI
In this presentation we will provide insights around the inherent risks related to using Generative AI, self-trained LLMs and AI workloads. With data at the heart of any AI usage, we will cover efficient methodologies for identifying and mitigating your own risk to safely enable AI, making your workforce more productive and driving toward the innovation AI promises. Specifically the topic will engage the audience to consider how understanding the data set, its sensitivity, the access to it from internal employees to third parties, and how data will be used and created. Protecting data wherever it goes and ensuring compliance through the AI journey.
Learning Objectives: In this presentation the audience will learn about the inherent risks surrounding AI and therefore data within the enterprise. Marrying key objectives around cloud security, governance risk and compliance, risk management and threat detection/prevention through the AI lifecycle.
Speaker: Dubie Dubendorfer, Strategic Evangelist, Varonis
Presented by: Varonis
2:50 PM - 3:20 PM MST
WORKSHOP - Quantifying and Communicating Cyber Risk
Cyber risk scoring and quantification provide a practical framework that connects technical details with business needs, helping leaders understand and act on complex security data. By combining financial modeling, threat intelligence, real-world examples, and AI-powered monitoring, this approach clarifies risk, enabling informed, strategic decisions. As digital threats grow more sophisticated, effective cyber risk management becomes critical to maintaining resilience, compliance, and a competitive edge.
Speaker: Jason Dablow, Principal Engineer, Trend Micro
Presented by: Trend Micro
3:30 PM - 4:00 PM MST
WORKSHOP 1 - Pumpkin Spice & Cyber Advice: Communicating Security Principles with Relevance
Studies show that employees who are vigilant about cybersecurity in their personal lives tend to bring that same caution to their professional activities, resulting in fewer security breaches. In this session, we’ll focus on ways security professionals can make security more relevant to our end users and give them a greater reason for caring.
Speaker: Emily Cellar, VP of IT Security & Infrastructure, iFIT
3:30 PM - 4:00 PM MST
WORKSHOP 2 - Mitigating Risk in the Age of AI and Balancing AI with the Indispensable Human Element in Cybersecurity
In the age of AI, cybersecurity must balance the strengths of AI with the irreplaceable human element. While AI excels at rapidly analyzing data and detecting threats, it lacks the intuition, adaptability, and ethical judgment of human experts. Effective risk mitigation requires blending AI’s speed and precision with human oversight, ensuring cybersecurity remains agile, ethical, and resilient in the face of evolving threats. Join this session to explore how to strike the right balance and build a future-proof cybersecurity strategy.
Speaker: Tina Lampe, Director – IT Software Engineering, DirecTV
4:00 PM - 4:15 PM MST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
4:20 PM - 4:50 PM MST
WORKSHOP - Cyber Defense Strategies for Earlier Detection and Faster Response
Delve into the flaws of the traditional cybersecurity landscape and how a modern SOC should focus on outcome-based services without relying on logs or the cost and complexity of a SIEM.
Speaker: John Minasyan, Chief Operations Officer, LMNTRIX
Presented by: LMNTRIX
5:00 PM - 5:30 PM MST
WORKSHOP - Why IT Audits Are Your Friend
Who loves a good audit? Well, you should! Think of them as a helpful nudge to fix what’s weak, make sure you’re playing by the rules, and get your systems running smoother than ever. You’ll see how these check-ups are less of a headache and more like a secret weapon for keeping your tech game strong and secure.
Speaker: Rob Strickland, Interim CIO, InfoVista
6:00 PM - 7:00 PM MST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM MST
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM MST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM MST
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
Moderated by: James Christiansen, Data Security Leader, Cyera
Panelists:
Ray Lipps, CISO, Broadcom
Deborah Enright, CISO, West Coast University
Gary Eckman, VP of Cyber Security & Governance, Dyno Nobel
Chris Stoneley, CISO, Cathay Bank
10:00 AM - 10:30 AM MST
WORKSHOP - From Crisis to Confidence: How Data Protection Can Enhance Your Incident Response and Recovery
Cyber threats are more prevalent than ever and security teams are faced with the daunting task of optimizing their security posture while balancing budget, risk, and operational efficiency. With even the most sophisticated security stack plagued with coverage gaps and vulnerabilities, security teams are fatigued and don’t want to add yet another security tool.
Sometimes help comes from an unexpected corner. Modern backup and data security can help IT and security come together and solve problems. Learn what a data security and protection partner like Druva can do to help strengthen your security posture and streamline your incident response and recovery workflows. We will cover:
- What typically occurs in each phase of a cyber attack
- Common security coverage gaps in your data infrastructure
- How to work better with your IT and backup teams
Speaker: Mohammad Al-Tumimi, Sales Engineer, Druva
Presented by: Druva
10:30 AM - 10:45 AM MST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM MST
WORKSHOP - Empowering Enterprises to Innovate Responsibly and Securely with AI
AI is evolving from a mere tool to a transformative catalyst for enterprise innovation. While it unlocks new business models and enhances decision-making through actionable insights, it also poses significant risks related to data privacy, security, and ethics.
Key Points:
- AI as a Catalyst for Change: Understanding how AI can drive business transformation and efficiency.
- Balancing Innovation and Risk: Addressing the dilemma faced by security teams—restricting AI use or risking exposure.
- Tools for Success: Providing CIOs & CISOs with enforcement tools and developers with AI security solutions to promote safe and rapid innovation.
- Future Resilience: Empowering organizations to navigate evolving markets by fostering responsible AI use.
Join us in exploring how to harness AI’s potential while safeguarding your organization’s future.
Speaker: David Ho, Senior Director – AI, Cybersecurity, and Technology Assurance, Salesforce
11:30 AM - 12:00 PM MST
PRESENTATION - Executing Technology Transformation with Trust
In a world where the pace of change equals the pace of expectation, building trust is more important than ever. As innovation speeds ahead, ensuring users feel secure and valued is paramount.
Picture this: tech rockets ahead, and our expectations chase right behind. When tech changes at breakneck speed, people’s expectations leap to keep up. Trust isn’t just a buzzword; it’s the bedrock of any thriving relationship between tech companies and their users. If leaders and companies don’t foster trust, everything is at risk—think data breaches, algorithm biases, human asset loss or fake news & misinformation. Building trust becomes the cornerstone because it’s the only way to keep users loyal and assured that their privacy, data, and well-being are protected. Trust is the invisible glue binding users and customers to the tech they depend upon.
As technology barrels forward, expectations of stakeholders, investors, customers, and onlookers, rise just as fast. Trust is the backbone that keeps everything steady amidst the whirlwind. When data breaches and misrepresentation are lurking at every corner, companies need to earn and keep trust by being transparent, ethical, and reliable. It’s not just about surviving the next innovation or living beyond this phase of transformation; it’s about making sure users feel secure and valued, ensuring they stick around for the ride. Join me as we talk about the key tenets, and challenges, to immerse trust in every step of your transformation journey.
Speaker: Shawnna DelHierro, Master of Ceremonies, Chief Technology Officer, STG Consulting
12:00 PM - 1:00 PM MST
SINC NETWORKING LUNCH
West Executive Advisory Council
Marc Mackey
Director of Global Technology PMO
Nike
Shawnna DelHierro
CTO
Sportsman Warehouse (Former)
Nadeem Iftikhar
CISO
NextNav
Roger Franke
Vice President of IT
Aramark
Elena Seiple
VP, CISO
Zillow
Niel Nickolaisen
CIO
Sorenson Communications
Paul Duchouquette
CIO
FDH Aero
Chris Stoneley
CISO
Cathay Bank
Robert Martin
CTO
Bridgepay Network Solutions
Vijay Mohnish
CTO
Ria Financial
Marcel Spitalnik
Director of Business Transformation
Danone
Adip Dsouza
VP of Technology
Merchants Mortgage & Trust Corporation
Sylvia Jessen
Director of IT
University of Utah School of Medicine
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- dinner Sponsor
platinum
Varonis
Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient, and employee data; financial records; strategic and product plans; and other intellectual property.
The Varonis Data Security Platform detects cyber threats from both internal and external actors by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
Varonis products address additional important use cases including data protection, data governance, Zero Trust, compliance, data privacy, classification, and threat detection and response. Varonis started operations in 2005 and has customers spanning leading firms in the financial services, public, healthcare, industrial, insurance, energy and utilities, technology, consumer and retail, media and entertainment, and education sectors
Learn Moregold
Cyera
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.
Learn Moregold
Netskope
Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
More from Netskope:
Learn Moregold
Tenable
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.
Learn Moregold
LMNTRIX
LMNTRIX is the leader in intelligence led security-as-a-service. Working as a seamless, scalable extension of customer security operations, LMNTRIX offers a single MDR solution called Active Defense that blends their cyber defense platform called LMNTRIX XDR with innovative security technologies, nation-state grade threat intelligence and world-renowned Cyber Defence Centers. With this approach, LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.
Learn Moregold
Cymulate
Cymulate, the leader in exposure management and security validation, provides a modular platform for continuously assessing, testing, and improving cybersecurity resilience against emergent threats, evolving environments, and digital transformations. The solution has a quantifiable impact across all 5 continuous threat exposure management (CTEM) program pillars and on a business’s ability to reduce risk by understanding, tracking, and improving its security posture. Offerings include Attack Surface Management (ASM), Breach and Attack Simulation (BAS), Continuous Automate Red Teaming (CART), and Exposure Analytics solutions. For more information, visit www.cymulate.com.
Learn Moregold
Vulcan
Vulcan Cyber® breaks down organizational cyber risk into measurable, manageable processes to help security teams go beyond their scan data and actually reduce risk. With powerful prioritization, orchestration and mitigation capabilities, the Vulcan Cyber risk management SaaS platform provides clear solutions to help manage risk effectively. Vulcan enhances teams’ existing cyber environments by connecting with all the tools they already use, supporting every stage of the cyber security lifecycle across cloud, IT and application attack surfaces.
Learn Moregold
Trend Micro
In the ever-evolving landscape of cybersecurity, staying ahead of threats is imperative. As we reflect on the past, embrace the present, and prepare for the future, the integration of artificial intelligence (AI) into security infrastructure has emerged as a disruptive technology in safeguarding digital assets. Join us at this exclusive event led by Trend Micro as we delve into the dynamic journey of AI’s impact on cybersecurity. From historical insights to current advancements and future projections, discover how AI is reshaping the defense mechanisms against cyber threats, fortifying your infrastructure, and empowering organizations to navigate the digital frontier with confidence.
More from Trend Micro:
Trend Vision One™ — Attack Surface Risk Management (ASRM)
Trend Vision One | Attack Surface Risk Management Explainer
Learn Moregold
Dynatrace
Dynatrace exists to make software work perfectly. The Dynatrace platform unifies observability, business, and security data at a massive scale (Grail) with continually updated topology and dependency mapping (Smartscape) to capture and retain full-stack data context. It leverages hypermodal AI (Davis), combining predictive AI to anticipate future behaviors, causal AI to deliver precise answers and intelligent automation, and generative AI to automatically provide recommendations, create suggested workflows or dashboards, and let people use natural language to explore, solve, and complete tasks. Dynatrace analytics and automation capabilities enable teams to modernize and optimize cloud operations, deliver software faster and more securely, and ensure flawless digital experiences.
Learn Moregold
SentinelOne
SentinelOne is a global leader in AI-powered security. SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber-attacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy and simplicity. Over 11,500 customers, including Fortune 10, Fortune 500, and Global 2000 companies, as well as prominent governments, trust SentinelOne to secure the future today. To learn more, visit Sentinelone.com.
gold
Druva
Druva is the leading provider of data security, helping customers secure data against all threats. The Druva Data Security Cloud is a fully managed SaaS solution that delivers air-gapped and immutable data protection across cloud, on-premises, and edge workloads. By centralizing protected data for each customer, Druva goes beyond traditional security to accelerate incident response, cyber recovery & remediation, and data governance. The company is trusted by its more than 6,000 customers, including 65 of the Fortune 500, to protect business data in an ever-connected world.
Learn Moredinner
Cyberbit
The Cyberbit platform provides security leaders with a single destination for managing all SOC readiness and skill development activities. Organizations use Cyberbit to benchmark and quantify their information security teams, plan and run skill development programs, screen candidates and train new hires. The Cyberbit platform provides hands-on cyber labs and the largest catalog of live-fire, simulated cyberattacks. Live-fire exercises run in a hyper-realistic cyber range that emulates real-world networks and provides commercial security tools, including SIEM, Firewall, and EDR products.
Learn More