
The Drake
The Drake, a Hilton Hotel is a historic downtown Chicago hotel in the Gold Coast, and has been a symbol of elegance and style since its opening in 1920. Celebrities and guests from around the world stay at the hotel to experience first class service.
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 - 5:00 PM CST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 - 7:00 PM CST
WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails.
7:00 - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 - 7:55 AM CST IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
8:00 - 8:10 AM CST SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:15 - 9:00 AM CST KEYNOTE PRESENTATION: Cybersecurity Trends 2022
As part of its research process for the Cybersecurity Trends 2022 Report, Info-Tech Research Group conducted an open online survey among its membership and the wider community of professionals. The survey was fielded from August 2021 through to September 2021, collecting 475 responses. We asked some of the same questions as last year’s survey so we can compare results as well as new questions to explore new trends.
Speaker: Mark Roman, Info-Tech Research Group
Presented by: Info-Tech Research Group
9:10 - 9:50 AM CST PRESENTATION: Low Hanging Fruit – Improving AD Security for the Easy Win
Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact, attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.
Speaker: Joseph Salazar, Technical Marketing Engineer, SentinelOne
Presented by: SentinelOne
10:00 - 10:30 AM CST EXECUTIVE PRESENTATION - Vendor Management: What Good Looks Like?
- Working with vendors can be pleasant, mutually beneficial, and accomplished well without significant time commitment
- Vendors offer a unique and powerful perspective that we should leverage
- As CISOs, we can enable a more efficient market by promoting and ignoring vendors as appropriate
Speaker: Brent Deterding, Ciso, Afni
10:30 - 10:45 AM CST NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
10:50 - 11:30 AM CST WORKSHOP 1 - MDR+ Mission Control for Cybersecurity
Three forces are colliding to create a perfect cyberstorm: An escalated threat level, a cybersecurity talent shortage and the growing complexity that comes with managing a multitude of security solutions. This storm is driving change, forcing us to break down silos between endpoint, workload, network and identity. It’s driving the need to leverage existing tooling rather than bolting on more. And it is reshaping the focus of managed security services away from “busy work” and toward “expert work.” This session will explore a case study of a new type of MDR service from Open Systems. A new approach that offers shelter from the storm.
Speaker: Alex Mattucci, Senior Sales Executive, Open Systems
10:50 - 11:30 AM CST WORKSHOP 2 - Creating a Human Experience for the Employee & Customer Journey
Two major priorities for CIOs are enabling employees to work more productively and improving the customer experience. Creating a holistic communications system around delivering positive experiences can achieve gains for both priorities. How can these changes support the kind of hyper-personalization and knowledge accumulation that delivers customer satisfaction at every step of the journey?
This session will address:
– Developing a strategic communications system with the customer journey in mind
-Creating customer experience synergies by blending capabilities like unified communications and contact centers Real-world challenges and strategies to overcome them
Speaker: Greg Rodda, Senior Account Executive, RingCentral

11:40 - 12:10 PM CST WORKSHOP 1 - Secure Digital Transformation in 2022 and Beyond
Digital Transformation in 2022 has taken on a NEW focus. With COVID and the forcing function of enterprises having to adapt the way they bring applications to market and collaborate; executives and leaders must have solutions that adapt, scale, and secure their assets. In this talk, we are going to discuss how enterprises can continue to equip their teams with solutions that enable speed and accuracy while also being very secure and scalable.
Speaker: Wesley Pullen, Field CTO, CloudBees
Presented by: Cloudbees
11:40 - 12:10 PM CST WORKSHOP 2 - A Global Shift Left in API Security
As business and technology teams around the world drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges for a global workforce.
Join this session to discuss:
- Managing the lifecycle of API risks
- Defending against API attacks
- Developer-led API security practices
Speaker: Karl Mattson, CISO, Noname Security
Presented by: Noname Security
12:20 - 12:50 PM CST WORKSHOP 1 - Data for DevOps: The Intersection of Data Automation and Data Security
Innovation driven by DevOps, cloud and AI/ML emboldens businesses to expand access to the essential fuel for those programs– enterprise data. At the same time, stringent privacy laws and frequent cyber attacks increase pressure to mitigate sensitive data risks. With more and more interaction shifting to the digital brand experience, how can today’s enterprises effectively unlock the power of their enterprise data and eliminate friction between data usage and data security?
Join this interactive session led by industry leaders to discuss the cultural shift modern enterprises are actively engaged in to make data more available, secure, compliant and resilient.
Speakers:
Alex Hesterberg; Chief Customer Officer
Delphix Cody Taylor; Senior Director, Product Engineering; Dell Technologies
Presented by: Delphix
12:20 - 12:50 PM CST WORKSHOP 2 - State of Open Source Security
Open source software (OSS) is at the core of the software applications we depend on today. With nearly all applications relying on dependent components, supply chain security’s growing complexity puts a greater focus on OSS than ever before. In May 2022 Snyk partnered with the Linux Foundation to release the State of Open Source Security Report – combining Linux Foundation research with survey data from over 550 Snyk Open Source (SCA) customer organizations. This report sheds light on the current security posture of open source software and reflects on key concerns and trends including.
* Over four out of every ten (41%) organizations do not have high confidence in their open source software security – with only 49% of organizations stating they have a security policy for OSS development.
* The average application development project has 49 vulnerabilities and 80 direct dependencies (open source code called by a project); and,
* The time it takes to fix vulnerabilities in open source projects has steadily increased, more than doubling from 49 days in 2018 to 110 days in 2021.
Speakers: Mic McCully, Field Strategist, Snyk
Presented by: Snyk
12:50 - 1:45 PM CST SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available.
1:50 - 2:45 PM CST
INTERACTIVE ROUNDTABLE & PANEL: Diving Into Talent Acquisition, Diversity, and Retention
30-minute open table discussion followed by a 25-minute panel to present individual table findings
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere. Additionally, we are still not recruiting enough woman and minorities into the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us for a discussion with your peers as we dive into solutions to tackle the following challenges:
- Could you please introduce yourself and tell us a little bit about how you ended up in technology and why?
- How do you scale staff / team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought – Old vs New Thinking?
- How do we get the buy in from leadership teams (and the entire company) on board with Diversity & Inclusion initiatives?
- Does your Organization have a Diversity task force? If so, What types of responsibilities does this group take on and how can they improve?
- Did you have a mentor at any point in your career and how did this individual help you?
- Is there a type of education, certificate or membership that helped you that you would recommend to others?
- Do you believe we are doing enough to encourage diversity in technology? What advice do you have for leaders who are looking to do more?
Moderator: Radhika Murudeshwar, Director Enterprise Architecture, UnitedHealth
Panelists:
Greg Malone, CIO, Webster University
Natalie Monga, Sr. Director, Global Security Services, Aon
Shoma Desai, VP of Information Technology, The Roomplace
Jermaine Mason, VP, Network Infrastructure, Wintrust Financial Corporation
2:55 - 3:25 PM CS PRESENTATION - Zero Trust and Microsegmentation - Easier Thank You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started? Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include: -Gaining visibility to where you are the most vulnerable
-Closing risky ports
-Leveraging tools you already have in place without adding layers of complexity While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Speaker: Christer Swartz, Principal Technical Marketing Engineer, Illumio
Presented by: Illumio

3:25 - 3:40 PM CST
NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
3:45 - 4:15 PM CST WORKSHOP 1 - 1,000 Cyber Attacks: New Ransomware Trends Reports Insights
There is no better teacher than one’s enemies and no better way to learn than by studying their attacks. Join us to hear the results of one of the largest independent research studies on ransomware preparedness and response, based on 1,000 unbiased organizations across nine countries around the world ― all of whom survived a cyber‑attack. Learn how those organizations persisted through ransomware events and how backup fits within their remediation strategies so you can improve your disaster recovery process.
This session will arm you with fresh insights on:
The pervasiveness of ransomware
Best practices for remediation
How immutability and air gapping can protect your data
How organizational alignment drives successful recovery
And more!
Speaker: Jeff Reichard, Vice President, Public Sector & Compliance Strategy, Veeam
Presented by: Veeam

3:45 - 4:15 PM CST WORKSHOP 2 - How Dinosaurs Became Oil and Other Cautionary Tales, Pragmatic Musings for Modernizing Business Processes
Open source software (OSS) is at the core of the software applications we depend on today. With nearly all applications relying on dependent components, supply chain security’s growing complexity puts a greater focus on OSS than ever before. In May 2022 Snyk partnered with the Linux Foundation to release the State of Open Source Security Report – combining Linux Foundation research with survey data from over 550 Snyk Open Source (SCA) customer organizations. This report sheds light on the current security posture of open source software and reflects on key concerns and trends including.
- Over four out of every ten (41%) organizations do not have high confidence in their open source software security – with only 49% of organizations stating they have a security policy for OSS development.
- The average application development project has 49 vulnerabilities and 80 direct dependencies (open source code called by a project); and,
- The time it takes to fix vulnerabilities in open source projects has steadily increased, more than doubling from 49 days in 2018 to 110 days in 2021.
Speaker: Mike Bachman, Global Architect & Principal Technologist, Boomi
Presented by: Boomi

4:20 - 5:00 PM CST INTERACTIVE PANEL - Building High Performing Teams: Lessons Learned from IT Leaders
A CIO can’t do it all or know it all- they need a great team behind them. Building that team isn’t so easy and empowering them to drive innovation takes a Leader pushing from the front. Many of these skills aren’t inherent and learned through years of trial and error. This session will discuss both the successes and failures of IT Leaders in building out their teams. While there’s no secret formula, there are commonalities amongst the more successful team builders. We will discuss:
Are you hiring the right people? Quality over quantity?
Do you have the right leadership style to drive employee success?
How do you retain top talent?
How do we impart our knowledge to the next generation of leaders?
Moderator: Bhadresh Patel, AVP Technology and Service Enablement, Humana
Panelists: Ankur Kothari, VP Cloud Architecture & Security, Confidential; Dhruv Agnihotri, AVP, Change Management, BOA; Tom Case, SVP – IT Customer Experience, YMCA of the North; Michael Whitkofski, Director, Infrastructure & IT Operations, OneSky Flight
5:30 - 7:00 PM CST SINC NETWORKING RECEPTION
Engage your Peers over canapes and cocktails.
7:00 - 9:00 PM CST SINC NETWORKING & ENGAGEMENT DINNER
7:55 - 8:55 AM CST
IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:05 - 9:45 AM CST
KEYNOTE PANEL
Check back for updates on this session.
9:55 - 10:25 AM CST
WORKSHOP 1 - Fast and Furious Attacks: Using AI to Surgically Respond
Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.
Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
Speaker: Connor Lind, Senior Cybersecurity Account Executive, Darktrace
Presented by: Darktrace
9:55 - 10:25 AM CST
WORKSHOP 2
10:25 - 10:40 AM CST
NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
10:45 - 11:15 AM CST
EXECUTIVE WORKSHOP - The Perfect Blend – Healthcare Interoperability: TEFCA, FHIR API’s and Blockchain (Oh My!)
This presentation will give a brief history of legacy interoperability to current day, highlighting the interoperability challenges as we migrate through different methodologies, standards and industry norms including the 21st Century Cures Act/TEFCA and how health information exchange could be drastically impacted by the implementation of a few blockchain concepts in the areas of identity, track and trace and consent to create a wholesale health data marketplace that puts the patient at the center of the equation and allows them to own, manage and profit from their health information.
Speaker: Michael Marchant, Director, Health Information Exchange and System Integration, UC Davis Health
11:20 - 11:50 AM CST
EXECUTIVE WORKSHOP
Check back for updates on this session.
12:40 PM - 1:30 PM CST
SINC NETWORKING LUNCH
TOLA Executive Advisory Council

Jackie Wallace
Senior Executive, Digital Technology
Baker Hughes, a GE Company

Dana Prochaska
Director, Information Security
Previously with McLane Company

Jeff Baker
CIO
NB Business Solutions

Rusty Kennington
CIO
Henry Company

Matt Singleton
CISO
State of Oklahoma

Sudhakar Virupakshi
CIO
Par Pacific Holdings

Robert Pace
CISO
Invitation Homes

Shivani Agarwal
Head of Information Technology Services
McLane Company
Interested in speaking? Please submit a request.
Submit RequestInterested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor

platinum
SentinelOne
SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation, and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks. More From SentinelOne: Singularity Hologram Data Sheet Singularity Identity Data Sheet
Learn More
platinum
Illumio
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk. More From Illumio: Illumio Corporate Overview Visibility and Ransomeware Containment
Learn More
gold
Open Systems
The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. Open Systems is deeply passionate about protecting organizations from that storm. Open Systems provides a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection.
Learn More
gold
Veeam
Veeam® is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. They provide a single platform for cloud, virtual, physical, SaaS and Kubernetes environments. Their customers are confident their apps and data are protected and always available with the most simple, flexible, reliable and powerful platform in the industry.
Learn More
gold
Noname
The Noname API Security Platform is the only solution to proactively secure your environment from API security vulnerabilities, misconfigurations, design flaws, and provides API attack protection with automated detection and response.
Learn More
gold
Darktrace
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. More From Darktrace: Autonomous Response, Everywhere Stages of a Ransomware Attack
Learn More
gold
Snyk
Snyk is the leader in developer security. They empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Their developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. More From Snyk: Supply Chain Security White Paper
Learn More
gold
CloudBees
Every business is a software business, and is under pressure to innovate constantly. This increased velocity introduces new business risks. CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom. More From CloudBees: The Definitive Guide to Modern Software Delivery
Learn More
gold
Boomi
Boomi instantly connects everyone to everything, anywhere with its cloud-native, unified, open, and intelligent platform. Boomi’s integration platform as a service (iPaaS) is trusted by more than 20,000 customers globally for its speed, ease-of-use, and lower total cost of ownership. As the pioneer at fueling intelligent use of data, Boomi’s vision is to make it quick and easy for customers and partners to discover, manage, and orchestrate data, while connecting applications, processes, and people for better, faster outcomes. For more information, visit www.boomi.com. More From Boomi: ERP Modernization: An App and Data Integration Story Case Study – WWZ Innovates Its CableInternet Services by Modernizing Its SAP Data Ecosystem
Learn More
gold
Delphix
Delphix is the industry leader for DevOps test data management. Businesses need to transform application delivery but struggle to balance speed with data security and compliance. Our DevOps Data Platform automates data security, while rapidly deploying test data to accelerate application releases. With Delphix, customers modernize applications, adopt multi-cloud, achieve CI/CD, and recover from downtime events such as ransomware up to 2x faster. Leading companies, including Choice Hotels, Banco Carrefour, and Fannie Mae, use Delphix to accelerate digital transformation and enable zero trust data management. Visit us at www.delphix.com. Follow us on LinkedIn, Twitter, and Facebook. More From Delphix: Delphix DevOps Data Platform Increases Revenue by $14 Million, Slashes Cost of Data Operations by $15 Million Delphix for Test Data Management
Learn More
gold
DataStax
DataStax is the real-time data company. DataStax helps enterprises mobilize real-time data and quickly build the smart, high-scale applications required to become data-driven businesses. The DataStax Astra cloud service uniquely delivers the power of Apache Cassandra®—the world’s most scalable database—with the advanced Apache Pulsar™ streaming technology in a unified stack, available on any cloud.
Learn More
gold
RingCentral
RingCentral, Inc. (NYSE: RNG) is a leading provider of business cloud communications and contact center solutions based on its powerful Message Video Phone (MVP ) global platform. More flexible and cost-effective than legacy on-premises PBX and video conferencing systems that it replaces, RingCentral empowers modern mobile and distributed workforces to communicate, collaborate, and connect via any mode, any device, and any location. RingCentral offers three key products in its portfolio including RingCentral MVP , a Unified Communications as a Service (UCaaS) platform including team messaging, video meetings, and cloud phone system; RingCentral Video , the company’s video meetings solution with team messaging that enables Smart Video Meetings; and RingCentral Cloud Contact Center solutions. RingCentral’s open platform integrates with leading third-party business applications and enables customers to easily customize business workflows. RingCentral is headquartered in Belmont, California, and has offices around the world.
Learn More
gold
Progress
Dedicated to propelling business forward in a technology-driven world, Progress helps businesses drive faster cycles of innovation, fuel momentum and accelerate their path to success. As the trusted provider of the best products to develop, deploy and manage high-impact applications, Progress enables customers to develop the applications and experiences they need, deploy where and how they want and manage it all safely and securely. Hundreds of thousands of enterprises, including 1,700 software companies and 3.5 million developers, depend on Progress to achieve their goals—with confidence.
Learn More
silver
Okta
Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 10,000 organizations, including JetBlue, Nordstrom, Siemens, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.
Learn More
silver
LMNTRIX
LMNTRIX is the leader in intelligence led security-as-a-service. Working as a seamless, scalable extension of customer security operations, LMNTRIX offers a single MDR solution called Active Defense that blends their cyber defense platform called LMNTRIX XDR with innovative security technologies, nation-state grade threat intelligence and world-renowned Cyber Defence Centers. With this approach, LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks. More From LMNTRIX: Context-Aware & Intelligence-Driven Cyber Defence Center Framework For Evaluating – Managed Detection & Response(Mdr) Extended Detection & Response (Xdr) Soc-As-A-Service And Managed Security Services A Buyers Guide – How to Select an MDR Provider?
Learn More