By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the Southeast IT & Security Leaders Forum and leave ready to inspire action within your Organization!

Wild Dunes Resort
Discover a beach resort unlike any other. Wild Dunes Resort on Charleston’s Isle of Palms barrier island is the ideal getaway for people who are seeking unpretentious luxury and convenient access to the beach and downtown Charleston, South Carolina. Boasting sweeping Atlantic Ocean views and an array of inspired amenities, including an onsite restaurant, full-service spa, tennis center, and “Best in State” golf course, the 1,600-acre resort will ease you into the joys of Charleston.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda
2:00 PM - 5:00 PM ET
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM ET
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM ET
SINC NETWORKING & ENGAGEMENT DINNER
7:30 AM - 8:25 AM ET
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:30 AM - 8:35 AM ET
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:35 AM - 9:25 AM ET
PANEL - Enabling the Institution for the Digital Economy: Key Future Trends
As the digital economy continues to expand, institutions must adapt to remain competitive and relevant. This session will explore the key trends shaping the future of the digital economy and how institutions can effectively enable their digital transformation. Topics will include advancements in digital infrastructure, the integration of artificial intelligence and machine learning, the importance of data analytics, and the shift towards digital-first business models. Experts will discuss the challenges and opportunities presented by these trends, providing practical insights on how institutions can leverage technology to enhance efficiency, innovation, and customer engagement. Attendees will gain a comprehensive understanding of the strategic steps necessary to thrive in the digital economy.
Moderator: Brian Benn, Chief Information Officer, Clark Atlanta University
Panelists:
Shilpi Ganguly, SVP, IT & Cybersecurity, The Weather Channel
Amir St. Clair, Associate VP, Enterprise Risk Management
Brett Hinson, VP of IT and CIO, Lipscomb University
Randy Temple, CIO, Freedom Mortgage
9:35 AM - 10:05 AM ET
WORKSHOP - Reducing Risk and Accelerating Security Investigations with Observability Data
The growing complexity of cloud-native architectures has led to an ever-expanding attack surface for bad actors to exploit vulnerabilities. The dynamic nature of these environments and the accelerated rate of change with DevOps practices has it increasingly difficult for traditional approaches to secure these applications and environments.
In this session we’ll explore:
- The importance of a unified observability and security strategy to improve an organization’s risk posture
- Leveraging observability data to investigate vulnerabilities and attacks more accurately and rapidly
- Developing best practices for IT and security teams to minimize risk
Speaker: Wayne Segar, Global Field CTO, Dynatrace
Presented by: Dynatrace
10:15 AM - 10:45 AM ET
WORKSHOP - Redefining Data Protection: Building Resilient and Secure Strategies for Modern Threats
This session will explore foundational and advanced strategies to safeguard data across diverse environments, including hybrid and multi-cloud settings. Topics will cover approaches to data security, compliance, threat detection, disaster recovery, and innovative techniques to mitigate risks such as ransomware and misconfigurations. Attendees will gain actionable insights into building resilient systems to protect critical information assets and ensure operational continuity in today’s dynamic landscape.
10:45 AM - 11:00 AM ET
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
11:05 AM - 11:35 AM ET
WORKSHOP - Beyond the Hype: Making Autonomous Security Operations a Reality
The relentless growth of cyber threats and the increasing complexity of modern IT environments have stretched security teams to their breaking point. Autonomous solutions promise much-needed relief, but CISOs are rightly cautious. This session cuts through the hype, providing a pragmatic roadmap for incorporating autonomous capabilities into your security operations.
We’ll explore the spectrum of autonomy, from basic automation (Level 4) to true AI-driven decision-making (Level 5), clarifying what’s possible today and what lies on the horizon. Discover the compelling reasons driving the need for autonomous alert triage and response and understand the critical role of the “virtual analyst” in this evolution.
This session will equip you with the knowledge to:
- Demystify “autonomous” and its varying levels.
- Grasp the urgency for autonomous solutions in modern security operations.
- Conceptualize the “virtual analyst” and its potential impact.
- Learn key criteria for evaluating virtual analyst solutions.
- Understand the challenges in building and deploying virtual analysts.
- Define the evolving role of human analysts in an autonomous future.
Join us to explore a realistic path toward autonomous security operations and prepare your organization for a more secure tomorrow.
Presented by: AirMDR
11:45 AM - 12:15 PM ET
WORKSHOP - Eliminating DevOps Delays: How to Automate Data for Fast, Quality Releases
Get Advice for Speeding Up Velocity in 2025
DevOps pipelines thrive on speed. Yet too many organizations are still held back by slow, manual, and poor-quality test data. Data challenges like this create delays in DevOps pipelines. It’s time to eliminate DevOps delays, and that’s where data automation can help.
What You’ll Learn:
- Common data challenges in DevOps and CI/CD pipelines.
- Actionable strategies to help you shift left and improve quality.
- How to automate compliant data for DevOps.
Speaker: Aaron Jensen, Senior Solutions Engineer, Delphix by Perforce
Presented by: Perforce
12:25 AM - 12:55 PM ET
PRESENTATION - Using AI to Enhance Customer and Employee Journeys
In today’s dynamic business environment, companies face the imperative of delivering instant answers and assistance to customers engaging with digital channels. This informative discussion addresses the vital elements needed to produce tangible results to meet this demand. While AI tools and smart agents can minimize human intervention, professionals across sales, marketing, and customer service must navigate customer interactions and team collaboration in new ways. In this chat we will address the challenges to be aware of in the strategic deployment of these technologies and steps to take to ensure they deliver expected value.
Presentation: RingCentral
1:00 PM - 1:55 PM ET
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, palates, and preferences. Vegan, vegetarian, halal options available
2:00 PM - 2:50 PM ET
PANEL - The CIO's Role in the Future of Work
As organizations adapt to technological advancements, remote collaboration tools, and changing workforce dynamics, the CIO emerges as a key strategist, orchestrating digital transformation initiatives and ensuring seamless integration of technology into the fabric of the modern workplace. This Panel will discuss how CIOs can drive innovation, enhance cybersecurity measures, and foster a flexible and inclusive work environment to meet the challenges and opportunities presented by the future of work.
Moderator: Brian Benn, Chief Information Officer, Clark Atlanta University
Panelists:
Steve Collins, CIO, United Veterinary Care
Erich Gazaui, CIO, Papa
Charles Cooper, CIO, Meharry Medical
3:00 PM - 3:30 PM ET
WORKSHOP - Building Resilient SaaS Security: Actionable Strategies to Emerging Threats
As organizations increasingly rely on SaaS applications, the risks associated with misconfigurations and emerging threats continue to rise. This session will explore how advanced SaaS security solutions provide the visibility, detection capabilities, and response tools needed to identify vulnerabilities, secure configurations, and mitigate threats in real-time. Discover tactical solutions to strengthen your SaaS security posture, protect critical data, and reduce risk in your cloud environment.
Speaker: Jay Klauser, Director of Solutions Engineering, AppOmni
Presented by: AppOmni
3:00 PM - 3:45 PM ET
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:50 PM - 4:20 PM ET
WORKSHOP - Risk Management in the Era of AI
This session provides a comprehensive exploration of the challenges and opportunities that arise with the integration of Artificial Intelligence (AI) in various industries. We’ll examine the intricacies of managing risks associated with AI technologies, highlighting the potential pitfalls and benefits they bring. By examining real-world examples and case studies, we’ll shed light on the complexities and ethical considerations involved in harnessing AI’s power while mitigating potential risks.
3:50 PM - 4:20 PM ET
WORKSHOP - Hiring and Retaining top IT & Security Talent
While the pool of talented cybersecurity professionals is increasing daily, there is still a shortage of cybersecurity professionals to go around. This sessions will dicuss how your organization can stand out from the crowd and attract the best. The session will cover the following topics: – How being an active CISO and Thought Leader is the best marketing for new talent – Creative ways to compete and assets that are important outside of salary – Increase training and access to non-cybersecurity experts that are already excelling at your company and how to determine that talent you already have in house.
Speaker: Edward Morando, VP, IT Infrastructure & Cloud Services, Convey Health Solution
4:30 PM - 5:00 PM ET
WORKSHOP - Redefining Secure Web Access: Transforming the Browser into the First Line of Defense
As organizations increasingly adopt web-based applications and remote work models, traditional security measures are proving insufficient to safeguard against modern threats. This session explores the transformative role of secure enterprise browsers in elevating web access from a potential vulnerability to a robust security advantage. Attendees will learn how innovative browser technologies can provide enhanced data protection, mitigate insider threats, and seamlessly integrate with existing security frameworks, ensuring both productivity and resilience in today’s dynamic digital landscape.
Speaker: Larry Helms, Vice President of Sales, Seraphic
Presented by: Seraphic
5:30 PM - 7:00 PM ET
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM ET
SINC NETWORKING & ENGAGEMENT DINNER
8:15 AM - 9:05 AM ET
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:10 AM - 9:40 AM ET
WORKSHOP - A Data Driven Journey: Insights and Lessons Learned
Everyone’s journey to being data-driven is unique. It’s like making an apple pie. It’s easy to get the ingredients, but you need to know how to put together the right recipe for a great apple pie. In this interactive discussion I will share insights and lessons learned in leading data modernization initiatives and in sharing the journey with customers. Data literacy, culture, governance, quality, technology stack modernization and architecture are all ingredients in driving towards the right data driven recipe. The discussion will include tips and tricks for reducing friction points and how to build the right recipe for your organization.
9:50 AM - 10:20 AM ET
WORKSHOP - The Unique Role of the CISO: Why Collaboration is Key
In today’s hyper-connected world, the role of the Chief Information Security Officer (CISO) has never been more critical—or more complex. Once seen as purely technical guardians of an organization’s digital assets, CISOs now sit at the intersection of technology, business strategy, and risk management. Success in this dynamic role hinges on one vital element: collaboration.
Speaker: Michael Marsilio, CISO, Paradies Lagardere
10:20 AM - 10:35 AM ET
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:40 AM - 11:10 PM ET
WORKSHOP - Maximizing Value Vs Minimizing Cost - Building a more Valuable IT Department
To meet the speed and agility demands of digital business, CIOs are transforming their IT departments and shifting a growing share of IT work from projects to products. At the same time, growth in business-led IT has expanded the span of employees across the enterprise who are responsible for technology initiatives.
This session will explore a cost management model and discuss how evolving IT cost management efforts to focus on value over pure cost will reduce (and even eliminate) reactive calls to cut IT costs. This session will provide a model and tactics to elevate the maturity of IT to focus on value over costs, while still meeting the business directives.
Speaker: Brian Benn, Chief Information Officer, Clark Atlanta University
11:15 AM - 11:45 AM ET
WORKSHOP - Why IT Audits Are your Friend
Who loves a good audit? Well, you should! Think of them as a helpful nudge to fix what’s weak, make sure you’re playing by the rules, and get your systems running smoother than ever. You’ll see how these check-ups are less of a headache and more like a secret weapon for keeping your tech game strong and secure.
Speaker: Rob Strickland, Interim CIO, Infovista
11:45 PM - 1:00 PM ET
SINC NETWORKING LUNCH
Southeast Executive Advisory Council

Eugene Kogan
Global IT Director, Head of IT and Security
Population Council

Michael Marsillio
CISO
Paradies Lagardere

Ashok Narayan
Global Director of Applications and Emerging Technology
Tosca Services

Gina Bennett
Director of Enterprise Solutions
YMCA of Metropolitan Atlanta

Kenneth Foster
Global Head of Architecture
Adient

Kenneth Viciana
VP, Global Data & Analytics Products
TSYS

Lorenzo Hines
Global SVP of Information Technology
Citi

Tanweer Surve
Head of Cloud Center of Enablement & Solutions Engineering
PNC Bank

Bradley Schaufenbuel
VP & CISO
Paychex, Inc

Stephen Demeritt
Global Head of IT Services & Delivery
Black & Veatch

Mitesh Patel
VP of IT
JP Morgan

John Whiting
Global Director Cyber Risk
Omnicon

Michael Onuoha
Head of Engineering & Architecture, Risk, Fraud & Collections
Citi

Nish Majmudar
VP & Chief Information Security Officer
Mathematica

Andy Flatt
SVP & CIO
National Healthcare

Deena Swatzie
VP, Head of Technology Risk
LPL Financial

Karl Forsberg
Senior Director IT, Infrastructure and Operations
North America Partners in Anesthesia
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor

platinum
RingCentral
RingCentral is a global leader in AI-powered trusted business communications, contact center, revenue intelligence, video and hybrid event solutions. RingCentral empowers businesses with conversation intelligence and unlocks rich customer and employee interactions to provide insights and improved business outcomes. With decades of expertise in reliable and secure cloud communications, RingCentral has earned the trust of hundreds of thousands of customers and millions of users worldwide.
Learn More
gold
AppOmni
AppOmni pioneered the SSPM category in 2018. Our mission is to prevent SaaS data breaches by securing the applications that power the enterprise. We deliver security that combines industry-leading threat research, expertise, and product depth, so our customers can enjoy secure SaaS productivity. See why over 25% of the Fortune 100, global enterprises and partners trust us.
Learn Moregold
AirMDR
AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation materially improves the speed and accuracy of incident investigation and response, lowers costs, and reduces the workload of human security analysts. With an AI virtual analyst first approach, customers enhance their threat detection and threat intelligence while gaining uninterrupted 24/7 incident response that is backstopped by live expert humans.
Learn More
gold
Dynatrace
Dynatrace exists to make software work perfectly. The Dynatrace platform unifies observability, business, and security data at a massive scale (Grail) with continually updated topology and dependency mapping (Smartscape) to capture and retain full-stack data context. It leverages hypermodal AI (Davis), combining predictive AI to anticipate future behaviors, causal AI to deliver precise answers and intelligent automation, and generative AI to automatically provide recommendations, create suggested workflows or dashboards, and let people use natural language to explore, solve, and complete tasks. Dynatrace analytics and automation capabilities enable teams to modernize and optimize cloud operations, deliver software faster and more securely, and ensure flawless digital experiences.
More from Dynatrace:
Learn More
gold
Perforce
The best run DevOps teams in the world choose Perforce to remove bottlenecks to speed up and deliver app experiences that move the needle. With Perforce’s suite of products built to develop and maintain high-stakes applications, companies can finally manage complexity with efficiency, achieve speed without compromise, and run their DevOps toolchains with full integrity. Perforce gives customers a DevOps Edge, from code to business-ready.
Learn More
gold
Seraphic
Seraphic is a unique browser security solution that protects enterprise assets and provides your security team with advanced governance and policy enforcement. It’s based on innovative technology – providing robust protection against all browser attacks, including full protection against zero-day and unpatched n-day attacks. Seraphic is easy to deploy, has no impact on performance, leaves user experience untouched, and is fully compatible across all browsers and devices.
Learn More
silver
ThreatLocker
ThreatLocker is leading the cybersecurity market towards a more secure approach to blocking unknown application vulnerabilities. The ThreatLocker Control Suite combines Application Whitelisting, Ringfencing™, Storage Control, and Elevation Control solutions in ways that make security simple.
ThreatLocker’s powerful suite of security tools is designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks.
Learn More