By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the Midwest IT & Security Leaders Forum and leave ready to inspire action within your Organization!

The Depot
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 PM - 5:00 PM CST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM CST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:55 AM CST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM CST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:55 AM CST
KEYNOTE PRESENTATION - Exposing Adversarial Conversations
The latest snapshot of your network traffic logs may look innocent enough, but hidden within your common ports and protocols are the movements of a cybercriminal who has secretly breached your systems and is now trying to expand its foothold within your virtual walls in multi-cloud environments.
It’s this east-west infiltration that turns what could be just a relatively minor breach into a damaging data exfiltration incident or a full-scale ransomware attack. That’s why reducing attacker dwell time, curbing lateral movement and detecting advanced threats are essential components to any network security strategy, whether you operate largely on premises, in private clouds or multi-cloud architectures.
Gain key insights and strategies related to the defense against post-breach lateral movement:
- Research, statistical analysis and threat reports that underscore the threat that lateral movement represents
- Key metrics, strategies and solutions for detecting post-exploitation east-west movement, including behavioral analysis and identifying threat signatures
- A Guide To Detecting & Restricting Lateral Movement
Speaker: Chad Skipper, Global Security Technologist, VMware
Presented by: VMware
9:05 AM - 9:35 AM CST
WORKSHOP 1 - Risk Management in the Era of AI
In this session, attendees will delve into the influence of AI on risk management within organizations.
This workshop will cover critical AI vulnerabilities, including model drift, “hallucinations,” and privacy concerns associated with public versus private AI models.
We’ll differentiate generative AI from analytical AI using practical use cases.
Executives are encouraged to share their own experiences and solutions to showcase how various risk factors were identified and mitigated. The session will also feature case studies, best practices, and discussions on emerging trends ad challenges in the field, with ample time for questions and interaction.
Speaker: Kevin McDermott, CTO, Cook County
9:05 AM - 9:35 AM CST
WORKSHOP 2 - Large Language Models and Generative AI for Data Engineering
Speaker: Kader Sakkaria, Chief Digital and Technology Officer, Ruffalo Noel Levitz
9:40 - 10:10 AM CST
WORKSHOP 1 - Software Liability and a Path Forward
As a research and advisory organization, we have a unique perspective on key trends in technology. This talk will cover the key trends such as generative AI, zero-trust security, recession preparation, Metaverse, digital processes, industry-based data models, recession preparation, environmental/social governance, and their applicability to IT organizations.
Join Sonatype’ as we discuss how companies can achieve digital transformation by delivering safer and faster applications, and the shift that needs to happen with companies becoming proactive in securing their Software Supply Chain.
Speaker: Maury Cupitt, RVP, Sales Engineering, Sonatype
Presented by: Sonatype
9:40 - 10:10 AM CST
WORKSHOP 2 - Accelerating Software Delivery and Ensuring Compliance through Value Stream Management
In the fast-paced world of IT and Security, optimizing software delivery and ensuring compliance are essential for organizations looking to remain competitive and meet ever-evolving customer demands. This presentation will explore the role of Value Stream Management (VSM) in accelerating software delivery, enhancing digital transformation efforts, and ensuring compliance within the IT & Security industry. Attendees will learn how VSM can drive innovation, efficiency, and compliance within their organizations by providing a comprehensive overview of VSM, discussing challenges and opportunities in the global context, and sharing best practices for successful implementation.
Speaker: Hope Lynch, Offshoot Evangelists, CloudBees
Presented by: Cloudbees
10:10 - 10:25 AM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:25 - 10:55 AM CST
WORKSHOP 1 - Cultivating Developer Security Adoption
Security programs have undergone major changes in recent years, to adapt to the changes that Agile development, DevOps pipelines, and faster deployments bring. New DevSecOps programs and models have resulted in a significant security ownership shift to the development teams. But in order for development teams to truly take responsibility for security, they need to embrace and adopt the new security practices. This is no easy feat! It introduces many organizational, process, and tooling challenges. In this session, we will discuss how others have successfully achieved this, and talk about tips and best practices on how you can improve the developer adoption of your security needs, as well as common pitfalls or problems to avoid.
Speaker: Anthony Sayre, Sr. Technical Success Manager, Snyk
Presented by: Snyk
10:25 - 10:55 AM CST
WORKSHOP 2 - Delivering Operational Resilience in the Age of Cyber Threats
In this session, you will learn how successful CIOs, CISOs, and CROs are proactively approaching security and compliance to reduce data exposure and recover from cyber events.
Silos between IT and SecOps have led to a lack of coordination and collaboration, resulting in breaches. Both groups must share the responsibility to improve posture in today’s threat landscape.
Rubrik has helped over 150 customers recover from cyber-attacks and is an industry leader in cyber resilience. Discover best practices for better preparation when adversaries breach your security wall and impact your data.
Speaker: Todd Barton, Regional Vice President of Sales Engineering, Rubrik
Presented by: Rubrik
11:05 - 11:35 AM CST
WORKSHOP 1 - Proactive Threat Hunting for SOC and Incident Responders
In this session, we will gain valuable insights into the world of threat hunting and its role in fortifying security operations centers and incident response teams. The session will explore the latest methodologies, tools, and best practices utilized by SOC analysts and incident responders to actively detect and neutralize emerging cyber threats. Through real-world examples and practical demonstrations, Executives will learn how to leverage threat intelligence, conduct network and endpoint analysis, apply machine learning algorithms, and foster a collaborative security culture, empowering them to stay one step ahead of adversaries and protect their organizations from sophisticated attacks.
Speaker: Craig Guymon, Sr. Solutions Architect, Binalyze
Presented by: Binalyze
11:05 - 11:35 AM CST
WORKSHOP 2 - Stop Trying to Boil the Ocean; Making Better Risk Decisions to Prevent Future Cyber Attacks
Discussing traditional approaches to Risk Management and why they are less and less effective as technology gets more complex and attacks get harder to detect. Including:
- Gaining comprehensive visibility across the modern attack surface
- Anticipating threats, identifying exposures and prioritizing efforts to prevent attacks
- Communicating cyber risk up and down the organization to help make better risk decisions
Speaker: Nathan Wenzler, Chief Security Strategist, Tenable
Presented by: Tenable
11:45 - 12:35 PM CST
ROUNDTABLE & PANEL - Driving The Business Through Technology
It is no secret that technology is changing the fabric of business operations and outcomes, and collaboration between IT and the business is more important than ever before. The conversation is no longer about how to align IT with the business, however in many cases technology is still viewed as a commodity rather than an enabler. So what can we do to successfully change this mindset both within our own organizations and across the industry as a whole? During this session, we will discuss the various challenges IT and digital leaders face when undergoing this cultural shift.
Moderator: Tellis Williams, VP Risk Mgmt/Chief Information Security Officer, Dream Exchange Holdings
Panelists:
Tammylynne Jonas, CIO, Donaldson Company
Greg Malone, Global Chief Information Officer, Webster University
Vinit Shah, Global Compliance Director, Aon
Steven Mullins, CISO, Stratosphere Quality LLC
12:35 - 1:25 PM CST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets, and preferences. Vegan, vegetarian, and halal options available
1:30 - 2:10 PM CST
PRESENTATION - Revolutionizing Communication Capabilities: Unleashing the Potential of Integrated Solutions for Enhanced Collaboration
Adoption of Microsoft Teams has become widespread, with Microsoft reporting 300 million active users. While Teams has become the go-to platform for video meetings and team messaging, many organizations have discovered its telephony capabilities don’t meet their needs. As a result, many organizations just like yours are searching for third-party solutions that fit neatly into Teams to transform it into a stronger communications hub. Join your peers to network and discuss how they’re leveraging Teams and how they’re integrating other services to unleash its full potential
Speaker: Jeffrey Sieber, Solutions Engineer, RingCentral
Presented by: RingCentral
2:20 - 2:50 PM CST
WORKSHOP - Towards Secure Generative AI: The Architect's Role in Shaping Responsible Systems
In our talk, we’ll first explain what generative AI is and why it’s exciting. We’ll then talk about potential risks.
Next, we’ll highlight the ethical side of AI, focusing on making it transparent, accountable, and fair. We’ll suggest ways to prevent risks, including robust testing, better rules, and the part public policy can play. Importantly, we’ll also delve into the crucial role of an AI architect. We’ll discuss how they can shape responsible AI from the ground up, set robust security protocols, and ensure ethical standards throughout the AI life cycle.
Lastly, we’ll share some real-world examples of responsible and secure AI, hoping to show a path forward where AI is both safe and beneficial to society.
Presented by: Senthil Kumar, Head Of Cloud Platform Architecture
3:00 - 3:30 PM CST
WORKSHOP 1 - How Organizations Can End the Era of Security Control Failure
Imagine a World Cup qualifying team that made it to the first match but had failed to prepare for its opponents. Stepping out on the pitch, the opposing team would run circles around them. This is the story in cybersecurity today. The impact of a lack of continuous security control validation is that security programs fail and breaches occur constantly. Only by testing controls against known threats can teams generate the data they need to understand performance, tune-up, and improve effectiveness.
In this talk, Jose will cover how the research team discovered that EDR controls in AttackIQ’s customer environments only stopped top adversary techniques 39 percent of the time, and outline recommendations for how to improve cybersecurity program performance at scale.
In their analysis, the AttackIQ Adversary Research Team selected real-world adversary techniques from MITRE ATT&CK under the following criteria, including: (1) they needed to be common techniques (not edge cases); (2) they needed to have had pronounced historical impacts, including in recent Russian operations in Ukraine; and (3) most importantly, the EDR solution providers needed to consistently block these key techniques in AttackIQ’s lab environment. The goal in selecting these techniques was to find a sweet spot for realistic and popular techniques that could be prevented by recommended security configurations but are not currently being prevented most of the time in customer environments.
Attendees will leave the talk with a deeper understanding of why advanced cyberdefenses fail against threats and how organizations can use automated testing and the MITRE ATT&CK framework to improve their overall security program performance
Speaker: Jose Barajas, VP, Global Sales Engineering, AttackIQ
Presented by: AttackIQ
3:00 - 3:30 PM CST
WORKSHOP 2 - Modern Cybersecurity: Defending Organizations and Innovating at Scale
All IT and security teams are responsible for innovating while keeping the trains running. Given today’s cybersecurity landscape, managing all of these priorities while protecting the organization can be a challenge. Join Tina Thorstenson, VP of the Industry Business Unit & Executive Strategist at CrowdStrike for an informative discussion that will not only highlight today’s threats and trends but also show how embracing a modern enterprise approach can enhance visibility, drive cloud innovation and security, and all the while help protect identities and technology assets.
This discussion will include success stories and lessons learned, plus highlight how effective teams frequently leverage partnerships, like CrowdStrike, as an extension of in-house security teams. Attendees will learn key approaches to help IT and security teams, drive operational efficiencies, lean into innovative projects and strengthen an institution’s overall security posture at the same time.
Speaker: Tina Thorstenson, VP of the Industry Business Unit and Executive Strategist, CrowdStrike
Presented by: CrowdStrike
3:30 - 3:45 PM CST
SINC NETWORKING, REFRESHMENT BREAK & RAFFLE DRAWING
Circle back with your Peers on the content so far while grabbing a coffee and a snack. 3:40 We will run our first Raffle Prize for those who have participated in the App today!
3:50 - 4:20 PM CST
WORKSHOP - Achieving the Benefits of Converged Endpoint Management
Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.
Join this session, Achieving the Benefits of Converged Endpoint Management, to learn more about how to:
- Identify & remediate risks that create the greatest exposure.
- Assess & measure unknown vulnerabilities.
- Maximize IT budgets and staffing during economic uncertainty.
- Enhance existing investment in strategic technology vendors.
Speaker: Mike Bitz, RVP Technical Account Management, Tanium
Presented by:Tanium
4:25 - 5:15 PM CST
ROUNDTABLE & PANEL - Diving into Talent Acquisition, Diversity and Retention
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough women and minorities into the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us at the roundtable with your peers as we dive into solutions to tackle the following challenges:
- How do you scale staff/team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought Old vs New Thinking?
- How do we mentor universities to implement actionable steps for supplying more IT talent?
Moderator: Brittney Harrell, Director of Cybersecurity, Zelis Healthcare
Panelists:
Aditya Kaushal, Sr Director, Walgreens Boots Alliance (Former)
Arlene Yates, VP Quality Engineer, Bank of America
Radhika Murudeshwar, Director Architecture, United Health Group
Digvijay Shanker, Director of IT, Optum
6:00 - 7:00 PM CST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
7:30 - 8:20 AM CST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
8:25 - 9:05 AM CST
PRESENTATION - How to Maximize ROI on Digital Investments with Value Stream Management and FinOps
As macro-economic concerns increase in 2023, organizations are looking to drive higher ROI from digital investments. Value Stream Management helps DevOps teams accelerate time to market and build on success by unifying your organization’s business and technology objectives. But accelerating revenue must be accompanied by optimized operational expenditures in order to maximize ROI. That’s where FinOps comes in.
In this session, you’ll learn how OpenText simplifies Value Stream Management by helping organizations track, analyze, and predict resourcing, reduce risk, and identify waste to help you increase value as a product flows from “strategy to delivery” to achieve superior business outcomes. Then you’ll learn how FinOps can help you optimize the cloud costs that are driven by agile development through a three-step approach: Inform, Optimize and Operate. This will enable you to:
- Maximize Business Value and Effectiveness: Discover, visualize, and manage the flow of value from “strategy to delivery” powered by AI and analytics that is easy to deploy.
- Accelerate Delivery and Efficiency: Integrate with your existing toolchains to improve productivity and remove friction in the value stream with smart automation.
- Gain Competitive Advantage: Differentiate customer experience with high-quality value stream insights to manage risk and streamline delivery. Empower continuous feedback, learning, and improvement.
Join OpenText to learn why the time for a joint VSM/FinOps approach is now and how to capitalize on it the easy way.
Speakers:
Chris Rollinger, Solution Architect | ITOM OpsB & NOM, OpenText
Dave Flynn, Chief Technologist, OpenText
Presented by: OpenText
9:10 - 9:50 AM CST
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
Moderator: Tellis Williams, VP Risk Mgmt/Chief Information Security Officer, Dream Exchange Holdings
Panelists:
Christer Swartz, Industry Solutions, Director, Illumio
Bradley Schaufenbuel, CISO, Paychex
MJ McSheehy, CISO, Addison Group
Erwin Carrow, Confidential
10:00 - 10:30 AM CST
WORKSHOP - Zero Trust / Self Serve Data for DevOps
IT organizations have two imperatives that seem to be at odds with each other: Maximize the velocity and quality of software development efforts – and – protect the firm’s systems and data from an ever increasing spectrum of threats. The teams clamoring for more autonomy and access to production systems, and the teams striving to protect the firm’s assets don’t have be adversaries. In this session you will learn how Delphix’s zero trust – data automation platform combines virtual database replication with the industry’s most efficient masking platform to give developers automated / instant access to protected replicas of production databases. Delphix’s unique approach enables application development teams to dramatically accelerate velocity and quality while at the same time enabling infosec teams to eliminate all the risks of infiltration or exfiltration of sensitive data from non-prod environments.
Speaker: Ilker Taskaya, Field CTO, Compliance Solutions, Delphix
Instructed by: Delphix
10:30 - 10:45 AM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:45 - 11:15 PM CST
WORKSHOP - Profitability or Growth — Why Choose?
11:25 - 11:55 PM CST
WORKSHOP 2: Is Your Roadmap Business-Driven or Vendor Dictated?
Today, the primary CEO priority is growth, with technology as a key enabler. However, vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business. Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor’s. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.
Presented by: Sean Willeford, Sr. Director Application Development, Discover
12:00 - 12:05 PM CST
SINC RAFFLE DRAWING
We will raffle off prizes for who provides the most feedback on our app and who has the most engaging LinkedIn post!
12:05 - 1:05 PM CST
SINC NETWORKING LUNCH
Serving to-go boxes for those in a hurry. Serving food for all tastes, palates, and preferences. Vegan, vegetarian and halal options available.
Midwest Executive Advisory Council

Radhika Murudeshwar
Director Enterprise Architecture - Clinical
UnitedHealth Group

Ross Tucker
CIO
Texas United Management Corporation

Dana Prochaska
Executive Security Advisor / vCISO
Freelance

Jeff Baker
CIO
NB Business Solutions

Rusty Kennington
CIO
Henry Company

Sudhakar Virupakshi
CIO
Buckeye Partners

Robert Pace
CISO
Invitation Homes

Shivani Agarwal
Head of IT
McLane Company

Tod Huber
CTO
Milwaukee County

Bhadresh Patel
Chief Technology Officer
Humana
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- diamond Sponsor
- platinum Sponsor
- gold Sponsor
- silver Sponsor

diamond
VMware
VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.
As the trusted foundation to accelerate innovation, VMware meets customers where they are. Instead of tradeoffs and compromise, VMware’s software offers businesses the flexibility and choice they need to build the future.
Learn More
platinum
RingCentral
RingCentral, Inc. (NYSE: RNG) is a leading provider of business cloud communications and contact center solutions based on its powerful Message Video Phone (MVP ) global platform. More flexible and cost-effective than legacy on-premises PBX and video conferencing systems that it replaces, RingCentral empowers modern mobile and distributed workforces to communicate, collaborate, and connect via any mode, any device, and any location.
RingCentral offers three key products in its portfolio including RingCentral MVP , a Unified Communications as a Service (UCaaS) platform including team messaging, video meetings, and cloud phone system; RingCentral Video , the company’s video meetings solution with team messaging that enables Smart Video Meetings; and RingCentral Cloud Contact Center solutions. RingCentral’s open platform integrates with leading third-party business applications and enables customers to easily customize business workflows. RingCentral is headquartered in Belmont, California, and has offices around the world.

platinum
OpenText
OpenText is a world leader in Information Management, helping companies securely capture, govern and exchange information on a global scale. OpenText solves digital business challenges for customers, ranging from small and mid-sized businesses to the largest and most complex organizations in the world. For more information about OpenText (NASDAQ/TSX: OTEX), visit www.opentext.com
Learn More
platinum
Rimini Street
More than 4,900 Fortune 500, Fortune Global 100, midmarket, public sector and other organizations from a broad range of industries have relied on Rimini Street as their trusted application enterprise software products and services provider. To learn more, please visit www.riministreet.com.
Learn More
gold
AttackIQ
AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with the MITRE Engenuity.
Learn More
gold
Snyk
Snyk is the leader in developer security. They empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Their developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce.
Learn More
gold
Tenable
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.
Learn More
gold
CrowdStrike
CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Learn More
gold
Tanium
See, control and protect every endpoint, everywhere, with the only Converged Endpoint Management (XEM) platform. It’s time for a convergence: https://www.tanium.com/converged-endpoint
More from Tanium:
Learn More
gold
Rubrik
Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
Learn More
gold
Delphix
Delphix is the industry leader for DevOps test data management.
Businesses need to transform application delivery but struggle to balance speed with data security and compliance. Our DevOps Data Platform automates data security, while rapidly deploying test data to accelerate application releases. With Delphix, customers modernize applications, adopt multi-cloud, achieve CI/CD, and recover from downtime events such as ransomware up to 2x faster.
Leading companies, including Choice Hotels, Banco Carrefour, and Fannie Mae, use Delphix to accelerate digital transformation and enable zero trust data management. Visit us at www.delphix.com. Follow us on LinkedIn, Twitter, and Facebook.
Learn More
gold
Cymulate
Cymulate, the leader in exposure management and security validation, provides a modular platform for continuously assessing, testing, and improving cybersecurity resilience against emergent threats, evolving environments, and digital transformations. The solution has a quantifiable impact across all 5 continuous threat exposure management (CTEM) program pillars and on a business’s ability to reduce risk by understanding, tracking, and improving its security posture. Offerings include Attack Surface Management (ASM), Breach and Attack Simulation (BAS), Continuous Automate Red Teaming (CART), and Exposure Analytics solutions. For more information, visit www.cymulate.com.
Learn More
gold
CloudBees
Every business is a software business, and is under pressure to innovate constantly. This increased velocity introduces new business risks. CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.
Learn More
gold
Sonatype
The Sonatype journey started 15 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world’s most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation.
Over time, we witnessed the staggering volume and variety of open source libraries that began flowing into every development environment in the world. We understood that when open source components are properly managed, they provide a tremendous energy for accelerating innovation. Conversely, when unmanaged, open source “gone wild” can lead directly to security vulnerabilities, licensing risks, enormous rework, and waste.
Our vision today is simple.
We are laser focused on helping organizations continuously harness all of the good that open source has to offer, without any of the risk. In order to do this, we have invested in knowing more about the quality of open source than anyone else in the world. This investment takes the form of machine learning, artificial intelligence, and human expertise, which in aggregate produces highly curated intelligence that is infused into every Nexus product. Organizations equipped with Nexus products make better decisions, innovate faster at scale, and rest comfortably knowing that their applications always consist of the highest quality open source components.
More from Sonatype:
The Forrester Wave™ Software Composition Analysis, Q2 2023
Learn More
gold
Binalyze
Binalyze is the world’s fastest and most comprehensive DFIR solution. Our software remotely, securely, and automatically collects more than 280 digital forensics artifacts in under 10 minutes.
With evidence collected, our Timeline, Triage and Drone features help you to collaborate and complete incident response investigations quickly and dramatically reduces dwell time.
Binalyze saves you time, reduces cybersecurity operational costs and helps you prevent the financial and reputational losses associated with cyber attacks.
Learn More
gold
Illumio
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.
Learn More
silver
Cyera
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.
Learn More