The SINC Midmarket IT & Security Leaders Forum brings together top leaders for three days of engagement geared specifically towards our IT executives.
Forum speakers and presentations will focus on topics most directly impacting attendee resource challenges, which will in turn drive regional industry growth. Executives and service providers alike will engage through one-on-one engagements and open-discussion group meetings, all while creating valuable networking and community-building opportunities to foster regional development.

Talking Stick Resort
Talking Stick Resort is a luxurious Four-Diamond Scottsdale resort, where fun is limited only by your imagination. Play in style on the 240,000 square foot casino, savor the flavors and take in the panoramic views from the award-winning Orange Sky Restaurant, or test your skills on one of the most scenic and challenging golf courses in Scottsdale. Then when it’s time to relax, head up to The Spa and enjoy a relaxing spa treatment while overlooking incredible views of the Valley.
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
12:00 PM - 2:00 PM MST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
1:00 - 2:00 PM MST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available
2:10 - 2:15 PM MST
SINC OPENING REMARKS
A Thank You from SINC- setting the tone for a great day!
2:15 - 3:00 PM MST
PANEL - Successfully Navigating Change Management
As businesses and organizations embrace their own digital transformation (DX) journey, change management becomes a critical success factor. However, success heavily depends on the people using the technology. Change management goes beyond acquiring an executive sponsor or providing staff training, it is about changing the mindset of the employees, impacts to their daily routine and how to operationalize it. The promise of rapid deployment and time to value hinge on having a strong change management program in place. How do we get change adopted across all levels of the company?
Moderator: Isaac Sacolick, Bestselling Author, Top Social CIO/CDO, Digital Transformation Influencer, Star CIO
Panelists:
Wes Nugent, Director of Information Technology, R.E. Garrison Trucking, Inc.
David Clark, CIO, Utah State Bar
Kenny Williams, CIO, Lashify
Bill Floyd, CIO/CISO, Futu Inc.
3:10 - 3:50 PM MST
PRESENTATION - Zero Trust and Microsegmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started? Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Speaker: Ryan Ikeler, Head of MSP & MSSP Channel, Illumio
Presented by: Illumio
4:00 - 4:30 PM MST
EXECUTIVE WORKSHOP - Evolution of Protection of Cardholder Data
Check back for updates on this session.
Speaker: Robert Martin, CTO, Bridgepay Network Solutions
4:35 - 5:15 PM MST
WORKSHOP - Double/Triple-Play Immutability in the Age of Ransomware
As organizations continue to face the challenge of fighting ransomware attacks, the question often comes up just how protect their data properly. Unfortunately, there is no single silver bullet that solves the problem. Join this session to learn more about how a layered approach employing multiple defenses sets you up to recover from any scenario.
Speaker: Joseph Marton, SE Manager, North Central US, Veeam
Presented by: Veeam
6:00 - 7:00 PM MST
SINC NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 - 9:00 PM MST
SINC NETWORKING & ENGAGEMENT DINNER
Open seating buffet meal serving 5 star food and great Peer engagement before Day 1 kick’s off
7:45 - 8:45 AM MST
IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
8:50 - 8:55 AM MST
SINC OPENING REMARKS
A Thank You from SINC- setting the tone for a great day!
8:55 - 9:35 AM MST
EXECUTIVE PRESENTATION - The First Year as a Midmarket CIO
- What ideas does an established and experienced CIO bring with them when entering a Midmarket organization?
- What are the priorities?
- How do you obtain company buy-in from the get-go?
- How about attempting all of this during a global pandemic?
Speaker: Jeff Baker, CIO, Valle del Sol
9:40 - 10:25 AM MST INTERACTIVE PRESENTATION - Tech Trends 2023 – Use This Report to Consider how Technology Leaders can Attack Opportunities While Protecting the Organization from the Risks Posed
Last year’s Tech Trends report focused on the capabilities organizations would need to compete in a digital economy. We are continuing that theme this year with four trends that are focused on helping the organization deliver value faster and better. At the same time, we’re considering the volatility of a world dealing with several major crises simultaneously. Organizations need to protect themselves from that volatility to thrive. So, we have three trends focused on the risks all organizations will face in the year ahead.
Speaker: Shawn Evenson, Regional Director, Info-Tech Research Group
Presented by: Info-Tech Research Group
10:25 - 10:40 AM MST
REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:45 – 11:15 AM AM MST
WORKSHOP - Don’t Be a Victim: How to Anticipate & Protect Your Network and Data Against Breaches
To stay ahead of threat actors, your IT operations must be proactive, deploying new efforts and methods for enterprise security. But no single approach alone can break the complex chain of attack, which is why a multi-dimensional, network-centric approach is critical to maintaining your security posture.
Just as you would protect your home with a range of edge and internal security solutions, defending your network and data from invasion requires a complementary, layered approach. Monitoring the environment from multiple vantage points, identifying patterns that could be early indicators of attack, and implementing a proactive response model are all keys to success.
Join the workshop and learn how to:
- Protect your application data environments through a multi-dimensional security approach
- Close the security gap between perimeter & endpoints through network visibility
- Set policies that establish and maintain your security posture
Andy Redman, Director of Solution Engineering, Progress Software
Presented by: Progress Software
11:20 - 12:15 PM MST
ROUNDTABLE & PANEL - Building an IT Strategy for Mid-Market Enterprises
Mid-Market IT departments are so overburdened with managing the day-to-day that strategic thinking is often afterthought. All IT departments are limited by their capacity, but Mid-Market Organizations feel this constraint more than their counterparts and necessary strategic initiatives are neglected if their value and risk doesn’t translate to business terms.
Moderator: Helen Knight, Transformation Consultant, Helen Knight Consulting
Panelists:
Carl Gordon, CIO, Malco Products
Brian Benn, CIO, Atlanta Housing Authority
Sachin Vaidya, CISO, Heritage Bank of Commerce
12:15 PM - 1:05 PM MST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available
1:15 - 1:45 PM MST
WORKSHOP - The Zoom Effect: A Framework for Security Program Transformation
As companies grow from startups to global enterprise, their information security organizations often need to undergo rapid transformations to meet the needs and scale of the business and its customers. It can be challenging for information security teams to clearly define and communicate those needs, and obtain necessary executive support, funding, and resources for the program. To address these challenges, establishing a framework can help these teams communicate and gain executive support and buy-in of information security objectives, prioritizing the objectives based on risks and capabilities, and measuring the ongoing effectiveness of the program on a regular cadence.
Join Heather Ceylan, Head of Security Standards, Compliance, and Customer Assurance at Zoom as they discuss “The Zoom Effect”, provide a general framework that can be adapted to rapidly transform, scale, or improve your security program, and share the outcomes, lessons learned and key factors to consider.
Speaker: Heather Ceylan, Head of Security Standards, Compliance, and Customer Assurance, Zoom
Presented by: Zoom
1:50 - 2:20 PM MST
EXECUTIVE WORKSHOP - Why the Nonprofit Sector Needs CIOS & How You Can Help
Building a compelling business case for digital transformation is a challenge faced by many technology leaders. It becomes even more complicated when the change beneficiaries are not the funders, and the choice to invest in technology feels like it is taking services from our most vulnerable citizens. Helen Knight, an award-winning leader of non-profit digital transformations will share how she modernized emergency shelters and food banks, and how she uses technology to optimize services for people struggling with poverty. Helen will also share ways technology leaders can use their skills to help people today, and invite you to help solve the challenges ahead.
Speaker: Helen Knight, Transformation Consultant, Helen Knight Consulting
2:25 - 2:55 PM MST
WORKSHOP - Prioritizing Threats with Intelligence Requirements
With so many external threats out there, how does your organization prioritize which ones to focus on? Organizations should strive to take an intelligence based approach to security, and the key to any successful intelligence program is to have clear, well defined intelligence requirements. This presentation will introduce methods organizations can use to help define their intelligence requirements and drive a successful intelligence program.
Speaker: Jason Hage, Principal Consultant, Recorded Future
Presented by: Recorded Future
2:55 - 3:10 PM MST
NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:15 - 3:50 PM MST
EXECUTIVE PRESENTATION - Why Digital Trailblazers are the Secret to Successful Digital Transformations
Following the success of Isaac Sacolick’s first book, Driving Digital, in this keynote, Isaac will share stories and insights from his new book publishing this summer, Digital Trailblazer: Essential Lessons to Jumpstart Transformation and Accelerate Your Technology Leadership.
Your business needs more transformation leaders – what Isaac calls Digital Trailblazers—who can lead teams, evolve sustainable ways of working, develop technologies as competitive differentiators, and deliver business outcomes. This keynote highlights who are Digital Trailblazers, how to empower them, and what practices they will need to drive digital transformation.
Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO/CDO, Digital Transformation Influencer, Star CIO
3:55 - 4:30 PM MST
FIRESIDE CHAT - The Role of Academia in Addressing the Talent Gap
Check back for updates on this session.
Panelists:
Faisal Akkawi, Executive Director of Information Systems Programs, Northwestern
Tim Tominna, VP IT Operations, Spear Education
Isaac Sacolick, Bestselling Author, Top Social CIO/CDO, Digital Transformation Influencer, Star CIO
5:30 - 7:00 PM MST
SINC NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 - 9:00 PM MST
SINC NETWORKING & ENGAGEMENT DINNER
Open seating buffett meal serving 5 star food and great Peer engagement before Day 1 kick’s off
West Executive Advisory Council

Roger Franke
Vice President of IT
Aramark

Elena Seiple
VP, CISO
Zillow

Niel Nickolaisen
CIO
Sorenson Communications

Paul Duchouquette
CIO
FDH Aero

Chris Stoneley
CISO
Cathay Bank

Robert Martin
CTO
Bridgepay Network Solutions

Vijay Mohnish
CTO
Ria Financial

Marcel Spitalnik
Director of Business Transformation
Danone

Adip Dsouza
VP of Technology
Merchants Mortgage & Trust Corporation

Sylvia Jessen
Director of IT
University of Utah School of Medicine

Tanweer Surve
Technology CTO
Wells Fargo
Interested in speaking? Please submit a request.
Submit RequestInterested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor

platinum
Illumio
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.
Learn More
gold
Recorded Future
Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so businesses can be conducted with confidence. Recorded Future is trusted by hundreds of businesses and government organizations around the world. Learn more at www.recordedfuture.com
More From Recorded Future:
Executive Brief: Inside the Dark Web
Top Five Areas Where Intelligence Bolsters Your Security
Learn More
gold

gold
Veeam
Veeam® is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. They provide a single platform for cloud, virtual, physical, SaaS and Kubernetes environments. Their customers are confident their apps and data are protected and always available with the most simple, flexible, reliable and powerful platform in the industry.
Learn More
gold
Progress Software
Dedicated to propelling business forward in a technology-driven world, Progress (Nasdaq: PRGS) helps businesses drive faster cycles of innovation, fuel momentum and accelerate their path to success. As the trusted provider of the best products to develop, deploy and manage high-impact applications, Progress enables customers to develop the applications and experiences they need, deploy where and how they want and manage it all safely and securely. Hundreds of thousands of enterprises, including 1,700 software companies and 3.5 million developers, depend on Progress to achieve their goals—with confidence.
Learn More
silver
LMNTRIX
LMNTRIX is the leader in intelligence led security-as-a-service. Working as a seamless, scalable extension of customer security operations, LMNTRIX offers a single MDR solution called Active Defense that blends their cyber defense platform called LMNTRIX XDR with innovative security technologies, nation-state grade threat intelligence and world-renowned Cyber Defence Centers. With this approach, LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.
Learn Moregold
Info-Tech Research Group
Info-Tech Research Group is the world’s fastest growing information technology research and advisory company, serving over 30,000 IT professionals. Info-Tech produces unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. Info-Tech partners closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.
Learn more here at: InfoTech.com
Learn More