Gathering the foremost Cybersecurity Executives from across America, we will be addressing the most prevailing Technology and Leadership challenges encountered within a constantly evolving corporate environment.
Over two and a half days, we will cultivate meaningful connections and confront cybersecurity challenges in an intimate, dynamic setting. Attendees will gain insights from peers through diverse workshops, panels, roundtables, and presentations. Upholding a closed-door policy ensures that all dialogues remain within the confines of the Forum walls, fostering genuine and engaging conversations.
Discover cutting-edge technologies poised to address organizational gaps through tailored one-on-one engagements, strategically scheduled throughout the Forum and chosen based on individual needs.
Forge new connections, nurture existing ones, celebrate successes, and empathize with the shared challenges encountered by fellow Cybersecurity Leaders.
Join us at the SINC CISO & Security Leaders Forum and depart equipped to inspire actionable change within your organization!

Sheraton Grand at Wild Horse Pass
I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda.
2:00 PM - 5:00 PM MST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM MST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM MST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:55 AM MST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM MST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:55 AM MST
KEYNOTE PRESENTATION - Enabling the Institution for the Digital Economy: Key Future Trends
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
9:05 AM - 9:35 AM MST
PRESENTATION - Mitigate Risk in the Age of AI
In this presentation we will provide insights around the inherent risks related to using Generative AI, self-trained LLMs and AI workloads. With data at the heart of any AI usage, we will cover efficient methodologies for identifying and mitigating your own risk to safely enable AI, making your workforce more productive and driving toward the innovation AI promises. Specifically the topic will engage the audience to consider how understanding the data set, its sensitivity, the access to it from internal employees to third parties, and how data will be used and created. Protecting data wherever it goes and ensuring compliance through the AI journey.
Learning Objectives: In this presentation the audience will learn about the inherent risks surrounding AI and therefore data within the enterprise. Marrying key objectives around cloud security, governance risk and compliance, risk management and threat detection/prevention through the AI lifecycle.
Presented by: Varonis
9:45 AM - 10:15 AM MST
WORKSHOP - Defending Against Adversarial Misuse of AI: A Paradigm Shift
The advances in AI are resulting in a transformation of the threat landscape. Adversaries are leveraging AI to exploit novel vulnerabilities and generate polymorphic malware variants. Cyber defense needs a paradigm shift from traditional reactive approaches of detection to preemptive approaches.
Join us in this engaging session to learn more about:
- How are adversaries exploiting AI for offensive campaigns?
- Why are traditional reactive approaches not sufficient?
- What is preemptive security, and what are the strategies to achieve it?
Presented by: Acalvio
10:15 AM - 10:30 AM MST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:35 AM - 11:05 AM MST
WORKSHOP - Blockchain and Cybersecurity
Blockchain technology offers unique security features that can be leveraged to enhance cybersecurity. This session will explore the intersection of blockchain and cybersecurity, examining how blockchain can improve data integrity, secure transactions, and protect against cyber threats. Experts will discuss real-world applications, potential challenges, and future trends. Attendees will gain insights into how to incorporate blockchain technology into their cybersecurity strategies.
11:15 AM - 11:45 AM MST
WORKSHOP - Establishing a Best-of-Breed Security Strategy
In the debate over an all-in-one cyber security platform versus best of breed solutions, the overwhelming majority lean towards best of breed in order to leverage the most impactful technology. However, does true best of breed exist? This session will look to explore this debate and how to implement a best of breed strategy when tech doesn’t necessarily integrate with other tech.
11:55 AM - 12:45 PM MST
PRESENTATION - Minutes to Meltdown: Navigating a High-Stakes Ransomware Attack
Join an intimate group of industry peers to experience a simulated cyber-attack, taking on a leadership role in a fictional company during a ransomware negotiation. Engage in a dynamic agenda with a realistic storyline inspired by recent high-profile breaches, confronting challenges and making critical decisions along the way.
Topics discussed:
Security Assurance, Identity and Access Management, Social Engineering, Threat Detection, Cyber Incident Response, Ransomware, Governance and Reporting Regulation in USA.
Guided by Commvault Security expert, attendees will navigate the ransomware journey and leave this session with an actionable toolkit and recommendations to evaluate their own company’s disaster recovery plan.
Our goal is for attendees to experience a realistic simulation of a complex cyber-attack scenario, enabling them to navigate demands and determine the next steps to protect their company’s data and restore business operations
Presented by: Commvault
12:45 - 1:35 PM MST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, Palates, and preferences. Vegan, vegetarian, halal options available
1:40 PM - 2:10 PM MST
PRESENTATION - A New Paradigm for Managing Third-Party Risk
In the past 12 months, 87% of F1000 businesses were affected by significant cyber incidents as a result of a third-party. And yet, most rely on ‘snapshot in time’ questionnaires. While necessary, snapshots are insufficient by themselves, and must be augmented with continuous monitoring in support of ongoing security operations. This requires a different approach, that includes external threat detection capabilities by using AI across Public Data.
- The Public Data opportunity: collect, process, alert across multiple languages / modalities
- Real-time external threat detection on a rapidly evolving threat landscape
- The most advanced AI techniques for automating the collection, processing, delivery, and initial analysis of millions of public data sources
Presented by: Dataminr
2:20 PM - 2:50 PM MST
WORKSHOP - The Rise of Quantum Computing and Its Impact on Cybersecurity
Quantum computing promises unprecedented computational power, which could revolutionize many fields, including cybersecurity. This session will explore the potential impacts of quantum computing on current cryptographic methods and cybersecurity measures. Experts will discuss the need for quantum-resistant algorithms, the timeline for quantum advancements, and how organizations can prepare for a quantum future. Attendees will gain a deeper understanding of the challenges and opportunities posed by this emerging technology.
3:00 PM - 3:50 PM MST
PANEL - Cybersecurity Insurance Becoming Mainstream
As cyber threats continue to escalate, cybersecurity insurance is becoming an essential component of risk management. This session will cover the basics of cybersecurity insurance, including coverage options, policy requirements, and the claims process. Participants will learn about the benefits and limitations of cybersecurity insurance, how to assess their organization’s risk profile, and best practices for selecting the right coverage. Real-world examples will illustrate the role of insurance in mitigating financial losses from cyber incidents.
3:50 PM - 3:30 PM MST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:35 PM - 4:05 PM MST
WORKSHOP - Driving Past the Data/Privacy Divide
To ensure relevance and competitiveness in today’s customer centric market, enterprises of all types are investing heavily in customer data capture and customer data analytics capabilities. With data being captured from so many new locations and at a deeper and more personal level than ever before privacy issues become more and more important. Enterprises need to constantly review their data capture and usage to determine value vs. risk and whether the incentive offered to the customer is sufficient to overcome any reticence on their part.
This session will address privacy issues, how to balance opt in vs opt out requirements and that Data Privacy certainly isn’t a roadblock to data capture but the customer incentive needs to be sufficient to justify the sharing of personal details.
4:10 PM - 5:00 PM MST
ROUNDTABLE + PANEL: Cybersecurity in the Era of Regulatory Compliance
In an age where regulatory compliance is increasingly complex and stringent, cybersecurity has become a critical focus for organizations worldwide. This session will delve into the intricate relationship between cybersecurity and regulatory compliance, highlighting the latest regulations and standards that organizations must adhere to. Topics will include GDPR, CCPA, HIPAA, and other regional and industry-specific regulations, as well as the implications of non-compliance. Experts will discuss strategies for integrating compliance into cybersecurity frameworks, the role of continuous monitoring, and the importance of maintaining up-to-date documentation and reporting practices. Attendees will learn how to navigate the regulatory landscape, implement best practices, and ensure their cybersecurity measures align with legal requirements to protect both their data and their reputation.
6:00 PM - 7:00 PM MST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM MST
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM MST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM MST
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
10:00 AM - 10:30 AM MST
PRESENTATION - Navigating the Evolution of Cybersecurity: AI's Role in Securing Your Infrastructure from Past to Future
In the ever-evolving landscape of cybersecurity, staying ahead of threats is imperative. As we reflect on the past, embrace the present, and prepare for the future, the integration of artificial intelligence (AI) into security infrastructure has emerged as a disruptive technology in safeguarding digital assets. Join us at this exclusive event led by Trend Micro as we delve into the dynamic journey of AI’s impact on cybersecurity. From historical insights to current advancements and future projections, discover how AI is reshaping the defense mechanisms against cyber threats, fortifying your infrastructure, and empowering organizations to navigate the digital frontier with confidence.
10:30 AM - 10:45 AM MST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM MST
WORKSHOP - Zero Trust Security
The Zero Trust security model, which assumes no implicit trust within or outside an organization’s network, is gaining traction. This session will explore the principles of Zero Trust, its implementation challenges, and the benefits it offers. Participants will learn about key components such as micro-segmentation, continuous verification, and least-privilege access. Case studies will demonstrate successful Zero Trust deployments, providing practical insights for organizations looking to adopt this approach.
11:30 AM - 12:00 AM MST
PRESENTATION - Cybersecurity Skills Gap and Education
The growing demand for cybersecurity professionals has highlighted a significant skills gap in the industry. This session will discuss the current state of cybersecurity education, the challenges in developing a skilled workforce, and strategies to bridge the gap. Topics will include training programs, certifications, and partnerships between academia and industry. Attendees will learn about initiatives to attract and retain cybersecurity talent and how to cultivate a culture of continuous learning within their organizations.
12:00 PM - 1:00 PM MST
SINC NETWORKING LUNCH
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor

platinum
Dataminr
Dataminr puts real-time AI and public data to work for our clients, generating relevant and actionable alerts for global corporations, public sector agencies, newsrooms, and NGOs. Our leading AI platform detects the earliest signals of high-impact events and emerging risks from hundreds of thousands of public data sources. Our real-time alerts enable tens of thousands of users at hundreds of public and private sector organizations across the globe to learn first of breaking events around the world, develop effective risk mitigation strategies, and respond with confidence as crises unfold.
Learn More
platinum
Commvault
Commvault (NASDAQ: CVLT) is the gold standard in cyber resilience, helping more than 100,000 organizations to uncover, take action, and rapidly recover from cyber attacks—keeping data safe and businesses resilient and moving forward. Today, Commvault offers the only cyber resilience platform that combines the best data security and rapid recovery at enterprise scale across any workload, anywhere with advanced AI-driven automation—at the lowest TCO.
Learn More
platinum
Varonis
Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient, and employee data; financial records; strategic and product plans; and other intellectual property.
The Varonis Data Security Platform detects cyber threats from both internal and external actors by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
Varonis products address additional important use cases including data protection, data governance, Zero Trust, compliance, data privacy, classification, and threat detection and response. Varonis started operations in 2005 and has customers spanning leading firms in the financial services, public, healthcare, industrial, insurance, energy and utilities, technology, consumer and retail, media and entertainment, and education sectors
Learn More
gold
Acalvio
Acalvio, the leader in cyber deception technology, helps enterprises actively defend against advanced security threats. Acalvio Active Defense Platform, built on 25 issued patents in autonomous deception technology and advanced AI, provides robust solutions for Identity Threat Detection and Response (ITDR), Advanced Threat Defense for IT and OT networks, Zero Trust, Active Directory Protection and Ransomware Protection. The Silicon Valley-based company’s solutions serve Fortune 500 enterprises, government agencies and are available to deploy from the Cloud, on-premises or via marquee managed service providers.
Learn More