Gathering the foremost Cybersecurity Executives from across America, we will be addressing the most prevailing Technology and Leadership challenges encountered within a constantly evolving corporate environment.
Over two and a half days, we will cultivate meaningful connections and confront cybersecurity challenges in an intimate, dynamic setting. Attendees will gain insights from peers through diverse workshops, panels, roundtables, and presentations. Upholding a closed-door policy ensures that all dialogues remain within the confines of the Forum walls, fostering genuine and engaging conversations.
Discover cutting-edge technologies poised to address organizational gaps through tailored one-on-one engagements, strategically scheduled throughout the Forum and chosen based on individual needs.
Forge new connections, nurture existing ones, celebrate successes, and empathize with the shared challenges encountered by fellow Cybersecurity Leaders.
Join us at the SINC CISO & Security Leaders Forum and depart equipped to inspire actionable change within your organization!

Hyatt Regency Lost Pines Resort and Spa
Find your perfect Texas escape at Hyatt Regency Lost Pines Resort and Spa. Splash the day away and float in the lazy river at Lost Pines Water Park. Hit the greens at the award-winning 18-hole golf course. Test your skills at archery or explore Renegade Trailhead on horseback. Whether you’re seeking rest and rejuvenation at the full-service spa, quality time with the family while roasting s’mores at the firepits or delectable dining at the onsite restaurants there’s something for everyone at Hill Country resort.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda.
2:00 PM - 5:00 PM CT
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM CT
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM CT
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:55 AM CT
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM CT
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:55 AM CT
PANEL - Breaking the Chain: Should Cybersecurity Stop Reporting to IT?
As cybersecurity evolves from a technical function to a core business risk discipline, more organizations are rethinking the traditional CIO-CISO reporting structure. In this candid discussion, seasoned security leaders who report outside of IT — including to CFOs, CEOs, and boards — will unpack how this shift changes everything: visibility, influence, funding, and risk framing. The panel will explore the real-world pros and cons of reporting beyond IT, how it redefines the CISO’s role, and what organizational maturity is required to make it work.
Key Discussion Questions & Talking Points:
Strategic Impact
- How does reporting to the CFO or CEO reshape the CISO’s ability to position cybersecurity as a business enabler rather than a technical function?
- What influence does this shift have on cybersecurity’s role in enterprise risk management?
Funding & Resource Allocation
- Does reporting to finance improve conversations around cybersecurity funding and ROI?
- How can CISOs build a compelling business case for investment when security outcomes are preventative and often intangible?
Communication & Influence
- What new communication skills or business fluency must CISOs develop when moving outside of IT?
- How can CISOs better translate cyber risk into financial and operational terms that resonate with the C-suite?
Conflict of Interest with IT
- Does separating the CISO from the CIO help reduce conflicts of interest in areas like project timelines, performance, and user experience?
- How can CISOs maintain healthy collaboration with IT when they’re no longer in the same reporting line?
Organizational Readiness
- What kind of organizational structure, leadership support, and culture are needed to successfully reposition the CISO role?
- When shouldn’t a CISO report outside of IT — and what signs suggest the organization isn’t ready?
Career & Role Evolution
- How has this shift changed the panelists’ career trajectories or the perception of the CISO within the business?
- Does reporting outside IT create opportunities for broader responsibilities, such as enterprise risk or data governance?
Moderator: Mark Alba, Managing Director, Cybermindz
Panelists:
- George DeCesare, Cyber Risk Executive
- Vipul Gupta, Senior Vice President, Frost Bank
- Golan Ben-Oni, Global CIO and CISO, IDT
- Joseph Farah, Business Information Security Officer, Mr. Cooper
9:05 AM - 9:35 AM CT
PRESENTATION - A New Paradigm for Managing Third-Party Risk
In the past 12 months, 87% of F1000 businesses were affected by significant cyber incidents as a result of a third-party. And yet, most rely on ‘snapshot in time’ questionnaires. While necessary, snapshots are insufficient by themselves, and must be augmented with continuous monitoring in support of ongoing security operations. This requires a different approach, that includes external threat detection capabilities by using AI across Public Data.
- The Public Data opportunity: collect, process, alert across multiple languages / modalities
- Real-time external threat detection on a rapidly evolving threat landscape
- The most advanced AI techniques for automating the collection, processing, delivery, and initial analysis of millions of public data sources
Speaker: Jack Carraway, Field CISO, Dataminr
Presented by: Dataminr
9:45 AM - 10:15 AM CT
WORKSHOP 1 - Building a Resilient Risk Management Program: Strategies for Success
In an era of mounting digital threats and regulatory pressures, effective risk management is more critical—and more complex—than ever. Yet for many organizations, risk frameworks become bloated, theoretical, and disconnected from daily decision-making.
This executive session cuts through the noise, offering cybersecurity leaders a practical, actionable blueprint for building and sustaining a risk management program that drives real resilience. Attendees will learn how to simplify risk identification, prioritize threats based on business impact, and implement mitigation strategies that are both scalable and operationally feasible.
Key takeaways include:
- Translating risk management from theory into clear, repeatable processes
- Identifying and assessing risks in fast-moving, complex environments
- Communicating risk in business terms executives and boards can act on
- Building a dynamic, adaptable risk management framework that grows with your organization
- Using risk insights to drive better security investments and strategic decisions
Speaker: Nish Majmudar, CISO, Mathematica
9:45 AM - 10:15 AM CT
WORKSHOP 2 - The Risks and Rewards of Using Agentic AI
This session will include an overview of how Artificial Intelligence keeps improving at all sorts of things – including how to challenge corporate ethics and compliance programs. Even while organizations may still be struggling to tame the risks of generative AI, its more powerful cousin is already coming up fast: Agentic AI.
Agentic AI, as the name implies, is an AI “agent” that can act independently of humans to achieve various goals. It can devise itis own strategies to achieve those goals and learn from previous experiences to improve its strategies. It can even collaborate with other AI agents to solve complicated tasks in a coordinated fashion.
On one hand, Agentic AI sounds great, but there are still many risks that must be considered. Risks that could potentially cause great financial damage, or worse yet the loss of human life.
Topics will include:
- How to evaluate which tasks an AI agent should do.
- How to decide which AI agents to use.
- How to make AI agents’ actions explainable
- The importance of human ethics and awareness to make artificial intelligence succeed.
- The Risk vs Reward at what cost.
Speaker: Keith Deininger, VP, Enterprise Technology, Third party managment, Truist Financial Corp
10:15 AM - 10:30 AM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:35 AM - 11:05 AM CT
PRESENTATION - Identity Is the New Battleground: Exposing and Eliminating Invisible Threats Before They Strike
11:15 AM - 11:45 AM CT
WORKSHOP - Beyond Implementation: How to Measure Zero Trust Maturity for Long-Term Success
Zero Trust is no longer a buzzword; it’s a critical security framework for modern enterprises. But how do you confidently adopt such a framework, and how do you assess your organization’s Zero Trust maturity? How can you de-mistify Zero Trust for your organization and your executives? For CISOs, measuring progress, setting clear goals, and ensuring continuous improvement are crucial steps in the journey towards robust, Zero Trust security.
In this session, senior cybersecurity leaders will explore practical methods for evaluating and tracking the maturity of Zero Trust implementations. We will discuss key performance indicators (KPIs), benchmarks, and tools to assess the effectiveness of your Zero Trust framework, and how to align your security strategy with your organization’s evolving needs.
Key discussion points include:
- Defining Zero Trust Maturity: Key stages of Zero Trust implementation and how to assess your organization’s progress
- Critical KPIs and Metrics: What to measure to evaluate Zero Trust maturity and the security impact at each stage
- Aligning Zero Trust with Business Objectives: Ensuring that your Zero Trust strategy supports organizational goals while enhancing security
- Continuous Improvement: How to evolve your Zero Trust model to keep pace with emerging threats and technologies
- Real-World Case Studies: Insights from CISOs who have successfully implemented Zero Trust at scale, and lessons learned along the way
- Zero Trust is a journey, not a destination. Join us to learn how to measure your maturity and accelerate your organization’s path to real-world security resilience
Speakers:
- Jason Murphy, VP – Security Services & Delivery, DFIN (Donnelley Financial Solutions)
- Dannie Combs, SVP, CISO, DFIN
11:55 PM - 12:40 PM CT
INTERACTIVE SIMULATION - Minutes to Meltdown: Navigating a High-Stakes Ransomware Attack
Join an intimate group of industry peers to experience a simulated cyber-attack, taking on a leadership role in a fictional company during a ransomware negotiation. Engage in a dynamic agenda with a realistic storyline inspired by recent high-profile breaches, confronting challenges and making critical decisions along the way.
Topics discussed:
Security Assurance, Identity and Access Management, Social Engineering, Threat Detection, Cyber Incident Response, Ransomware, Governance and Reporting Regulation in USA.
Guided by Commvault Security expert, attendees will navigate the ransomware journey and leave this session with an actionable toolkit and recommendations to evaluate their own company’s disaster recovery plan.
Our goal is for attendees to experience a realistic simulation of a complex cyber-attack scenario, enabling them to navigate demands and determine the next steps to protect their company’s data and restore business operations
Speaker: Chris Bevil, Director, Enablement, Commvault
Presented by: Commvault
12:45 PM - 1:35 PM CT
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, Palates, and preferences. Vegan, vegetarian, halal options available
1:40 PM - 2:10 PM CT
PRESENTATION - Security Is Everyone’s Job: Making Cyber Risk a Company-Wide Priority
Cybersecurity isn’t just a tech challenge—it’s a people-driven challenge. Without a company culture heavy on security, even the best tools and policies will not be enough. In a world where a single click can trigger a crisis, every employee, vendor, customer, partner and executive must understand they are part of the security equation.
This high-impact session challenges senior cybersecurity leaders to rethink how they drive behavior change across their organizations. Learn how to embed cybersecurity into daily habits, leadership mindsets and company values—not just annual trainings. Discover how to transform security from “someone else’s job” into a core part of how your business operates and succeeds.
Key takeaways include:
- Why traditional awareness programs are not enough—and what actually works
- Strategies to make cybersecurity ownership part of every role, from intern to CEO
- Leveraging internal influencers and business units to drive culture change faster
- Communicating the “why” behind security in a way that sticks
- Building a culture where secure behavior is the default, not the exception
If you think cybersecurity tools are enough, think again. Culture is your true first line of defense—and the time to build it is now.
Speaker: Darrel Raynor, Cybersecurity Director, LCRA
2:20 PM - 2:50 PM CT
WORKSHOP 1 - Using Automation for Next Level Security
Traditional SOAR solutions often fall short of their promises, leaving SOC teams overwhelmed and vulnerable. Discover how AI automation goes beyond these limitations to deliver faster, smarter, and more effective security operations. Learn how next-level AI capabilities empower your team to detect, respond, and mitigate threats like never before.
Speaker: Jay Spann, Security Automation Evangelist, Swimlane
Presented by: Swimlane
2:20 PM - 2:50 PM CT
WORKSHOP 2 - Defending Against Adversarial Misuse of AI: A Paradigm Shift
The advances in AI are resulting in a transformation of the threat landscape. Adversaries are leveraging AI to exploit novel vulnerabilities and generate polymorphic malware variants. Cyber defense needs a paradigm shift from traditional reactive approaches of detection to preemptive approaches.
Join us in this engaging session to learn more about:
- How are adversaries exploiting AI for offensive campaigns?
- Why are traditional reactive approaches not sufficient?
- What is preemptive security, and what are the strategies to achieve it?
Speaker: Scott Hawk, CISO/Director, Acalvio
Presented by: Acalvio
3:00 PM - 3:50 PM CT
PANEL - Winning the Boardroom: Selling Cybersecurity at the Highest Levels
You know the risks. You see the threats. But getting the Board of Directors and business leaders to truly understand—and act—is a different battle entirely. In a world where cybersecurity is now a business issue, not just a technical one, how you communicate risk can make or break your strategy.
This fast-paced, executive session will arm cybersecurity leaders with proven strategies for translating technical complexity into business urgency. Learn how to frame cyber risk in terms leadership cares about—revenue protection, operational resilience, brand trust—and shift conversations from technical warnings to strategic opportunities.
Key takeaways include:
- Breaking out of “tech speak” and telling a risk story that resonates
- Delivering metrics and visuals that influence decision-making
- Understanding board dynamics: What they prioritize and what they ignore
- Moving from fear-based appeals to business-aligned action plans
- Building trust and credibility to secure long-term security investments
Moderator: Mark Alba, Mark Alba, Managing Director, Cybermindz
Panelists:
- David Cass, CISO, GSR
- Lori McElroy, Associate Chief Information Security Officer,The University of Texas System
- Jon Garza, CISO, PSA BDP
- Ken Foster, CISO, Candescent
3:50 PM - 4:05 PM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
4:05 PM - 4:35 PM CT
WORKSHOP 1 - Building Resilient SaaS Security: Actionable Strategies to Emerging Threats
As organizations increasingly rely on SaaS applications, the risks associated with misconfigurations and emerging threats continue to rise. This session will explore how advanced SaaS security solutions provide the visibility, detection capabilities, and response tools needed to identify vulnerabilities, secure configurations, and mitigate threats in real-time. Discover tactical solutions to strengthen your SaaS security posture, protect critical data, and reduce risk in your cloud environment.
Speaker: Dan Devane, Vice President, West, AppOmni
Presented by: AppOmni
4:05 PM - 4:35 PM CT
WORKSHOP 2 - Behind the Breach: A KEY to Enabling a Breach
We’ll walk through three data breaches, explain some of the factors that resulted in the breaches and list some preventative measures that could have helped in reducing the likelihood of them happening. We’ll then explain why a holistic key management view that goes beyond automation and incorporates compliance and risk reduction is necessary in today’s evolving cryptographic landscape.
Speaker: Chris Ghantous, Technical Solutions Director, Entrust
Presented by: Entrust
4:40 PM - 5:30 PM CT
INTERACTIVE ROUNDTABLE - Cybersecurity Leaders at the Breaking Point: Restoring Mental Clarity Amid Constant Crisis
Today’s CISOs and cybersecurity leaders are navigating an unrelenting storm—rising threats, escalating regulatory demands, resource constraints, and relentless board pressure. The result? Leadership fatigue, decision overload, and strategic tunnel vision at exactly the moment when clarity is most critical and team unity is needed.
This candid, executive-level session confronts the mental and operational toll cybersecurity leadership takes and offers real-world strategies for restoring focus, resilience, and effectiveness. Senior cybersecurity leaders will explore how to recalibrate decision-making under pressure, design teams and processes that reduce personal bottlenecks, and maintain a long-term strategic view despite the constant noise of daily crises.
Topics include:
- Recognizing the early warning signs of leadership burnout and decision fatigue
- Reengineering your operating model to distribute cognitive load and increase resilience
- Building personal and organizational systems that enable clear thinking under fire
- Maintaining strategic leadership amid short-term firefighting
- Redefining CISO success beyond survival—toward sustainable influence and impact
If you’re leading at the edge, this session will equip you to step back, refocus, and lead smarter for the long game.
Speakers:
- Mark Alba, Former Chief Product and Marketing Officer, Anomali, Managing Director, Cybermindz
- Peter Coroneos, Founder, Cybermindz
6:00 PM - 7:00 PM CT
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM CT
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM CT
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM CT
PANEL - Leadership at the Speed of Threat: Navigating Technology Shifts and Cultural Change in Cybersecurity’s New Era
In today’s environment, success isn’t about predicting the next threat – It’s about being ready for when it arrives. Cybersecurity executives are now tasked with making faster, sharper decisions as both technology and adversary tactics evolve at unprecedented speed. Survival demands a new kind of leadership—one that blends rapid technological adoption with equally agile cultural transformation.
This panel brings together leading CISOs and cybersecurity executives to discuss how they are navigating the dual pressures of innovation and resilience. Attendees will hear firsthand how top leaders are balancing emerging technologies like AI, Zero Trust, and automation with the human and organizational shifts needed to defend against tomorrow’s threats.
Topics will include:
- Leading security strategies that keep pace with technological disruption.
- Creating a culture that can adapt as fast as the threat landscape evolves
- Balancing innovation with acceptable levels of business risk
- Preparing teams and infrastructures for the unknown: resilience as a core competency
- Redefining the CISO role for an era of perpetual transformation
10:00 AM - 10:30 AM CT
WORKSHOP 1 - Redefining Product Security in the Age of AI and Quantum
Artificial Intelligence and Quantum Computing are not just disruptive forces—they are redefining the very foundation of product security. AI is accelerating the speed of both innovation and cyberattacks, while quantum computing threatens to break today’s cryptographic defenses entirely.
In this forward-looking session, senior cybersecurity executives will explore how these technologies are impacting product design, development, and security at the deepest levels. We’ll discuss the urgent need to rethink security architectures, prepare for post-quantum threats, and leverage AI responsibly to defend the next generation of products.
Speaker: Jacob Combs, CISO, Tandem Diabetes
10:00 AM - 10:30 AM CT
WORKSHOP 2 - The Evolving Role of the CISO: From Shadowy Technician to Strategic Business Leader
The CISO role, created as a purely technical function 30 years ago, has evolved into a critical strategic leadership position. Today’s CISOs shape enterprise strategy, foster operational resilience, and navigate complex regulatory and personal liability risks. This session explores how CISOs are redefining leadership to protect both their organizations and their own professional standing.
Speaker: Amit Basu, VP, CIO & CISO, International Seaways
10:30 AM - 10:45 AM CT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM CT
WORKSHOP
11:30 AM - 12:00 PM CT
PRESENTATION - Scaling Security with Innovation While Keeping Pace with Rapid Software Evolution
As technology continues to evolve at an unprecedented pace, cybersecurity teams face the mounting challenge of securing increasingly complex software ecosystems. From cloud-native applications to microservices and DevSecOps, the tools and strategies that worked yesterday may not be enough to protect tomorrow’s applications.
In this session, senior cybersecurity leaders will explore strategies for keeping software security aligned with rapid technological advancements. We’ll discuss how to adapt security measures to modern development practices, mitigate risks from emerging technologies, and ensure that your software security strategy evolves in lockstep with your organization’s needs.
12:00 PM - 1:00 PM CT
SINC NETWORKING LUNCH
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor

platinum
Dataminr
Dataminr puts real-time AI and public data to work for our clients, generating relevant and actionable alerts for global corporations, public sector agencies, newsrooms, and NGOs. Our leading AI platform detects the earliest signals of high-impact events and emerging risks from hundreds of thousands of public data sources. Our real-time alerts enable tens of thousands of users at hundreds of public and private sector organizations across the globe to learn first of breaking events around the world, develop effective risk mitigation strategies, and respond with confidence as crises unfold.
Learn More
platinum
Commvault
Commvault (NASDAQ: CVLT) is the gold standard in cyber resilience, helping more than 100,000 organizations to uncover, take action, and rapidly recover from cyber attacks—keeping data safe and businesses resilient and moving forward. Today, Commvault offers the only cyber resilience platform that combines the best data security and rapid recovery at enterprise scale across any workload, anywhere with advanced AI-driven automation—at the lowest TCO.
Learn More
gold
AppOmni
AppOmni pioneered the SSPM category in 2018. Our mission is to prevent SaaS data breaches by securing the applications that power the enterprise. We deliver security that combines industry-leading threat research, expertise, and product depth, so our customers can enjoy secure SaaS productivity. See why over 25% of the Fortune 100, global enterprises and partners trust us.
Learn More
gold
Acalvio
Acalvio, the leader in cyber deception technology, helps enterprises actively defend against advanced security threats. Acalvio Active Defense Platform, built on 25 issued patents in autonomous deception technology and advanced AI, provides robust solutions for Identity Threat Detection and Response (ITDR), Advanced Threat Defense for IT and OT networks, Zero Trust, Active Directory Protection and Ransomware Protection. The Silicon Valley-based company’s solutions serve Fortune 500 enterprises, government agencies and are available to deploy from the Cloud, on-premises or via marquee managed service providers.
Learn More
gold
Swimlane
At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit from the world’s first and only hyperautomation platform for every security function. Only Swimlane gives you the scale and flexibility to build your own hyperautomation applications to unify security teams, tools and telemetry ensuring today’s SecOps are always a step ahead of tomorrow’s threats.
More from Swimlane:
Vulnerability Response Management
Agentic AI & Automation for Every Security Function
Learn More
gold
SpyCloud
SpyCloud’s automated identity threat protection solutions leverage advanced analytics to prevent ransomware and account takeover, safeguard employee and consumer accounts, and accelerate cybercrime investigations.
Learn More
gold
Entrust
Entrust fights fraud and cyber threats with comprehensive identity-centric security that protects people, devices, and data. Our solutions help enterprises and governments safeguard critical systems from every angle, enabling secure onboarding and issuance, providing everyday identity protection, and empowering them with 360-degree visibility and orchestration across keys, secrets, and certificates so they can transact and grow with confidence. Building on our decades as a pioneer and innovator in establishing trust, Entrust has a global partner network and supports customers in over 150 countries.
Learn More
gold
iboss
iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secure Web Gateway (SWG), SD-WAN, branch firewalls, Browser Isolation, and Cloud Access Security Broker (CASB) capabilities, iboss replaces legacy solutions to enhance security, reduce complexity, and lower costs. Utilizing Zero Trust Network Access (ZTNA), iboss grants users access only to the applications they need based on their identity, minimizing risks of breaches and data loss. As a unified network and security service with a single-pane-of-glass management console, iboss empowers organizations to enhance security, improve user experience, and support a distributed workforce in today’s evolving digital landscape.
Learn More
silver
ThreatLocker
ThreatLocker is leading the cybersecurity market towards a more secure approach to blocking unknown application vulnerabilities. The ThreatLocker Control Suite combines Application Whitelisting, Ringfencing™, Storage Control, and Elevation Control solutions in ways that make security simple.
ThreatLocker’s powerful suite of security tools is designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks.
Learn More