The SINC Southeast IT & Security Leaders Forum brings together top leaders for three days of engagement geared specifically towards our IT executives.
Forum speakers and presentations will focus on topics most directly impacting attendee resource challenges, which will in turn drive regional industry growth. Executives and service providers alike will engage through one-on-one engagements and open-discussion group meetings, all while creating valuable networking and community-building opportunities to foster regional development.

Renaissance Nashville Hotel
Boasting modern and inspiring features, Renaissance Nashville Hotel is a stylish haven in legendary Nashville, Tennessee. The hotel is situated in the heart of downtown, attached to Fifth + Broadway, and steps from attractions such as Bridgestone Arena and Ryman Auditorium. Recharge in upscale hotel rooms and suites with plush bedding, expansive workstations, marble bathrooms, and striking views of downtown Nashville.
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 PM - 5:00 PM CST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM CST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 - 7:55 AM CST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM CST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 - 8:55 AM CST
KEYNOTE PRESENTATION - Exposing Adversarial Conversations
The latest snapshot of your network traffic logs may look innocent enough, but hidden within your common ports and protocols are the movements of a cybercriminal who has secretly breached your systems and is now trying to expand its foothold within your virtual walls in multi-cloud environments.
It’s this east-west infiltration that turns what could be just a relatively minor breach into a damaging data exfiltration incident or a full-scale ransomware attack. That’s why reducing attacker dwell time, curbing lateral movement and detecting advanced threats are essential components to any network security strategy, whether you operate largely on premises, in private clouds or multi-cloud architectures.
Gain key insights and strategies related to the defense against post-breach lateral movement:
- Research, statistical analysis and threat reports that underscore the threat that lateral movement represents
- Key metrics, strategies and solutions for detecting post-exploitation east-west movement, including behavioral analysis and identifying threat signatures
- A Guide To Detecting & Restricting Lateral Movement
Speaker: Chad Skipper, Global Security Technologist, VMware
Presented by: VMware
9:00 - 9:40 AM CST
PRESENTATION - Buying in the C-Suite
We hear a lot of thoughts about selling into a C-Suite. It’s time to talk about it from the perspective of executives within that suite and how we make buying decisions. We will discuss the various considerations and thought processes that C-Suite executives follow when buying products and services:
- Requirements vs Features
- Taking control of the buying schedule
- Follow through and Execution
- What products and services are purchased by the C-Suite and which are delegated to other teams?
- Pet peeves
Join Grant and Joe as they discuss this important topic from an angle that other executives inside and outside of the C-Suite will relate.
Speakers:
Grant Shih, Chief Technology Officer, Aramark
Joe Marroquin, Chief Information Security Officer / Chief Compliance Officer,
9:40 - 9:55 AM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:00 - 10:30 AM CST
WORKSHOP 1 - How Organizations Can End the Era of Security Control Failure
10:00 - 10:30 AM CST
WORKSHOP 2 - Zero Trust / Self Serve Data for DevOps
10:40 - 11:10 AM CST
WORKSHOP 1 - In The Know: Coping with Recession Concerns on IT Spending
Concerns of a Recession looms whether there results in one or not. With a war raging across the ocean, a potential European energy crisis this winter, and inflation numbers in the US refusing to subside, the macroeconomic environment has caused enterprise IT leaders to rethink their strategies. Learn how your peers are changing their plans to deal with the recession.
Speaker: Eric Helmer, Chief Technology Officer, Rimini Street
Presented by: Rimini Street
10:40 - 11:10 AM CST
WORKSHOP 2 - Supply Chain – The Real Insider Threat
What if I told you that 80% of the source code for your application was written by strangers? Furthermore, your developers have implicitly invited those strangers to help on your digital transformation projects. By downloading and using open source libraries, you have decreased your time to market. What has it done to your risk? What governance do you have over open source in your enterprise, and can you detect if something is wrong?
Incidents such as the recent Log4J CVE, have reminded us that while not malicious, these libraries can be misused to attack us. If you were impacted by this event, you should have some idea of how mature your organization is and made some decisions on how to improve. Your ability to respond in a timely manner to these situations is critical.
Today we are seeing the rise of the criminal coder. Through various means, they are injecting open source software with malicious code. The ecosystem for sharing these libraries was created to share easily, not securely. Using some traditional attacks as well as some that are novel and unique to each ecosystem, they have put your company at risk.
Your ability to detect and react to this new threat landscape has three components:
- Telemetry that alerts you to the suspicious and malicious software that your developers have inadvertently selected and integrated
- The quality and maturity of your incident response playbook
- The hygiene of your development organization and its ability to make production changes quickly and safely
Join us to learn about these topics and bring real improvements back to your workplace.
Speaker: Peter Chestna, CISO of North America, Checkmarx
Presented by: Checkmarx
11:15 - 12:05 CST
ROUNDTABLE & PANEL - Driving The Business Through Technology
It is no secret that technology is changing the fabric of business operations and outcomes, and collaboration between IT and the business is more important than ever before. The conversation is no longer about how to align IT with the business, however in many cases technology is still viewed as a commodity rather than an enabler. So what can we do to successfully change this mindset both within our own organizations and across the industry as a whole? During this session, we will discuss the various challenges IT and digital leaders face when undergoing this cultural shift.
Moderator: Ken Foster, VP IT Risk Governance and Compliance, Fleetcor
Speakers:
Ed Moore, Sr. Director – Identity and Access Management, Carnival Corporation
Kevin Burns, CIO, City of Melbourne
Vladimir Svidesskis, CISO, Vaco
Danilo Nogueira, CISO, Roper Technologies
12:05 - 1:00 PM
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets, and preferences. Vegan, vegetarian, and halal options available
1:05 - 1:35 PM CST
WORKSHOP 1 - Bridging the Gap Between Tech and Business Leadership to Enable Innovation and Transformation
1:05 - 1:35 PM CST
WORKSHOP 2 - The Indispensable Human Element of Cybersecurity
Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.
Join this session to discuss:
- What these trends mean for the hands-on practitioner
- When velocity of innovation outpaces the capabilities of human intellect
- The role of automation in the effective practice of securing our digital world
Speaker: Michael Leland, Chief Cybersecurity Evangelist, SentinelOne
Presented by: SentinelOne
1:45 - 2:15 PM CST
WORKSHOP 1 - Maturing Your Identity and Access Management Program
Weak identity and access management (IAM) practices result in considerable risk to the organization because IAM plays a role in most things in IT. Organizations typically do not have a high-level understanding of how identities and access are managed within the organization and no central ownership of IAM is a common reason why. Owners of IAM actions outside of IT may be resistant to adopting change but it’s our job to convey the importance and get the buy-in needed. This session will help identify the drivers behind improving your IAM practices and develop best practice processes for each section of the identity lifecycle.
Speakers:
Ben Field, Director of Information Security, Florida Crystals
Christine Vanderpool, CISO, Florida Crystals
1:45 - 2:15 PM CST
WORKSHOP 2 - Removing the barriers between IT and Business
Check back for updates on this session.
Presented by: Lorenzo Hines, Global SVP of Information Technology, Citi
2:25 - 2:55 PM CST
WORKSHOP 1 - Top 3 Cloud Security Efforts to Focus on in 2023
As cloud data volumes grow, so does cloud complexity. Traditional security infrastructure is no match for the constant changes, updates, and shifts that come with the cloud – let alone the rapid rise of sophisticated, malicious threats. That’s a lot to get your teams’ arms around! We’ve got three things you can focus on this year to ease that complexity and keep your business safe in the cloud.
Join this session to discuss how:
- Shifting left will be essential
- Supply chain risk will be a major concern
- Securing your cloud will be impossible without comprehensive visibility
Speaker: Tim Chase, Field CISO, Lacework
Presented by: Lacework
2:25 - 2:55 PM CST
WORKSHOP 2 - Secure Digital Transformation in 2023 and Beyond
Digital Transformation in 2023 has taken on a NEW focus. With COVID and the forcing function of enterprises having to adapt the way they bring applications to market and collaborate; executives and leaders must have solutions that adapt, scale, and secure their assets. In this talk, we are going to discuss how enterprises can continue to equip their teams with solutions that enable speed and accuracy while also being very secure and scalable.
Speaker: Wesley Pullen, Field CTO, CloudBees
Presented by: Cloudbees
2:55 - 3:10 PM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:15 - 3:45 PM CST
WORKSHOP 1 - Learn Value Stream Management the Easy Way: 3 Steps to Get You There
Value Stream Management may be the next big thing but seems like a lot to swallow. Even organizations with mature Agile and DevOps processes are unsure how to capitalize on this proven method of process improvement. To front-load success and reduce risk, you’ll need to see value quickly and then build on that success. Properly implemented, VSM can boost time-to-market and a company’s ability to compete and win in the marketplace by maximizing ROI and unifying your organization’s business and technology objectives.
In this session, you’ll learn how OpenText simplifies Value Stream Management by helping organizations track, analyze, and predict resourcing, reduce risk, and identify waste to help you increase value as a product flows from “strategy to delivery” to achieve superior business outcomes:
- Maximize Business Value and Effectiveness: Discover, visualize and manage flow of value from “strategy to delivery” powered by AI and analytics that is easy to deploy
- Accelerate Delivery and Efficiency: Integrates with your existing toolchains to improve productivity and remove friction in the value stream with smart automation
- Gain Competitive Advantage: Differentiate customer experience with high quality value stream insights to manage risk and streamline delivery. Empower continuous feedback, learning and improvement.
Join OpenText for this discussion, including why the time for VSM is now and how to capitalize on it the easy way.
Speaker: Lydia Casillas, Director of NA East Enterprise Accounts, Micro Focus
Presented by: Micro Focus
3:15 - 3:45 PM CST
WORKSHOP 2
3:55 - 4:35 PM CST
PRESENTATION - Systems of Experience: The CIO's Role in the Future of Work
The definition of work-life balance has changed, and the nature of work has changed. Life, family, and work are all integrated, we need software solutions that allow us the flexibility to live our lives and attract a diverse talent. Solutions that improve experience locally while allowing us to operate globally removing the friction, increasing productivity improving employee experience and in turn positively impacting the customer experience. Focused on retention and customer satisfaction.
Presented by: RingCentral
4:35 - 5:25 PM CST
ROUNDTABLE & PANEL - Diving into Talent Acquisition, Diversity and Retention
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough women and minorities into the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us at the roundtable with your peers as we dive into solutions to tackle the following challenges:
- How do you scale staff/team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought Old vs New Thinking?
- How do we mentor universities to implement actionable steps for supplying more IT talent?
Moderator: Sue Tripathi, Partner, Data, Analytics, Technology, Transformation, IBM
Panelists:
Jaye Anna Hill, VP Cyber Security Manager, Truist
Lorenzo Hines, Global SVP of Information Technology, Citi
Christine Vanderpool, CISO, Florida Crystals
Ashok Narayan, Global Director of Applications and Emerging Technology, Tosca Services
6:00 - 7:00 PM CST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:55 AM CST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 - 9:40 PM CST
MASTER OF CEREMONIES - KEYNOTE PANEL - Preparing IT & Cybersecurity Strategies and Budgets for a Volatile 2023
With many economists are anticipating a recession in 2023, the impact on IT departments is unclear. One would expect companies to pull back across the board and for those cuts to include IT. But the big surprise is that spending on IT is expected to increase.
Speaker: Mark Roman, CIO & Executive Counselor, Info-Tech Research Group
Presented by: Info-Tech Research Group
9:50 - 10:20 AM CST
WORKSHOP - Software Liability and a Path Forward
Security leaders are facing an increasingly complex, dangerous, and difficult digital landscape. Software supply chain attacks have increased an average of 742% each year since 2019. The average cost of a data breach is an astounding $4.35 million–not to mention the potential shareholder lawsuits, loss of customers, and damage to brand reputation. Earlier this month, The White House released a new cybersecurity strategy that calls for greater cybersecurity liability and holding software providers responsible for insecure products released to consumers. Meaning, it’s now an organizational imperative at the highest level to get serious about securing your software supply chain and stop malicious open-source codes before their download.
Join Sonatype’s Maury Cupitt as he discusses how companies can achieve digital transformation by delivering safer and faster applications, and the shift that needs to happen with companies becoming proactive in securing their Software Supply Chain.
Speaker: Maury Cupitt, Regional Vice President, Sales Engineering, Sonatype
Presented by: Sonatype
10:20 - 10:35 AM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:40 - 11:10 CST
WORKSHOP - Third Party Risk – An Old Topic with a New Twist?
We all rely on third parties to help our companies succeed. Working with these third parties to help protect the privacy and security of our company data is critical. This has been a challenge for years. Let’s discuss what is and isn’t working for companies of all sizes. How we can help each other hold these third parties accountable and perhaps work toward a standard framework.
Presented by: Elliott Franklin, CISO, ServiceMaster Brands
11:15 - 11:45 AM CST
WORKSHOP 1 - Back to Info-Sec Basics
Check back for updates on this session.
Presented by: Michael Marsilio, CISO, Paradies Lagardère
11:15 - 11:45 AM CST
WORKSHOP 2 - Data: AI & ML- A Reality Check
Presented by: Ashok Narayan, Global Director of Applications and Emerging Technology, Tosca Services
11:50 - 12:20 PM CST
FIRESIDE CHAT - 90-DAY PLAN IN YOUR NEW ROLE
You’ve just stepped into your new IT leadership role. Your first 90 days in a new IT leadership role should be focused on learning. Investing this time will help you understand the current state, appreciate the culture and inform your strategy. Prioritize these steps to kickstart improvement:
- Understand your job. Learn the organization and industry you are in
- Define and revise measurements for success
- Articulate your vision and strategy
- Organize people for success
- Build culture
- Revise processes for success & delivery, and suitable for the environment and the times
- Upgrade technologies
12:20 - 1:00 PM CST
SINC NETWORKING LUNCH
East Executive Advisory Council

Lorenzo Hines
Global SVP of Information Technology
Citi

Bradley Schaufenbuel
VP & CISO
Paychex, Inc

Stephen Demeritt
Global Head of IT Services & Delivery
Black & Veatch

Mitesh Patel
VP of IT
JP Morgan

John Whiting
Global Director Cyber Risk
Omnicon

Michael Onuoha
Head of Engineering & Architecture, Risk, Fraud & Collections
Citi

Nish Majmudar
Deputy CISO, Director of Information Security Engineering
FEPOC CareFirst BlueCross BlueShield

Robert Field
Vice President of Global Information Technology and Digital Solutions
Precipart

John Billington
CTO
TSD Global

Andy Flatt
SVP & CIO
National Healthcare

Deena Swatzie
SVP of Cyber Security Strategy & Digital Innovation
Truist

Karl Forsberg
Senior Director IT, Infrastructure and Operations
North America Partners in Anesthesia
Interested in speaking? Please submit a request.
Submit RequestInterested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- diamond Sponsor
- platinum Sponsor
- gold Sponsor
- silver Sponsor

diamond
VMware
VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.
As the trusted foundation to accelerate innovation, VMware meets customers where they are. Instead of tradeoffs and compromise, VMware’s software offers businesses the flexibility and choice they need to build the future.
Learn More
platinum
RingCentral
RingCentral, Inc. (NYSE: RNG) is a leading provider of business cloud communications and contact center solutions based on its powerful Message Video Phone (MVP ) global platform. More flexible and cost-effective than legacy on-premises PBX and video conferencing systems that it replaces, RingCentral empowers modern mobile and distributed workforces to communicate, collaborate, and connect via any mode, any device, and any location.
RingCentral offers three key products in its portfolio including RingCentral MVP , a Unified Communications as a Service (UCaaS) platform including team messaging, video meetings, and cloud phone system; RingCentral Video , the company’s video meetings solution with team messaging that enables Smart Video Meetings; and RingCentral Cloud Contact Center solutions. RingCentral’s open platform integrates with leading third-party business applications and enables customers to easily customize business workflows. RingCentral is headquartered in Belmont, California, and has offices around the world.

gold
AttackIQ
AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with the MITRE Engenuity.
Learn More
gold
Vertica by OpenText
Vertica by OpenText is the fastest, most advanced SQL analytics database, available on-premise, on Hadoop, and multiple clouds – all delivered via one unified platform. With tight integration with Hadoop, Kafka, and Spark, and built-in advanced analytics and Machine Learning, Vertica delivers the highest performance at extreme scale. Vertica. Built for fast. Built for freedom.
Learn More
gold
SentinelOne
SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation, and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks.
Learn More
gold
Micro Focus
OpenText has completed the purchase of Micro Focus. We are excited to provide expanded offerings to support our customers’ growing needs to digitize and work smarter. The world of information management just got stronger. We are now 25,000 experts strong making us better able to help our customers and fuel our innovation. OpenText powers and protects information to elevate every person and every organization to be their best.
More from Micro Focus:
Transform Software Delivery with ValueEdge
How Value Stream Management Gives Your Enterprise a Competitive Edge
Learn More
gold
Orasi
Orasi is a DevOps-focused software developer, reseller and consulting firm whose goal is to help companies streamline and optimize their DevOps pipelines, increasing efficiency and quality while reducing the risk of software failure. For more than 15 years, Orasi has been a software quality leader, helping organizations achieve excellence with market-leading test management, test automation, enterprise testing, environment hosting, and mobile testing technologies. In 2017, Orasi launched a new division—Advanced Technology Solutions (ATS)—which is at the vanguard of Orasi’s efforts to help client optimize their DevOps transformation. Orasi represents companies with software offerings across the entire software delivery spectrum, from data analytics and visualization services to continuous delivery and open source tooling. Orasi has established strategic sales and support services partnerships with Micro Focus (formerly HPE), Chef, SAP, XebiaLabs, AppDynamics, and others. For more information, please visit the Orasi company website: https://www.orasi.com.
Learn More
gold
Checkmarx
Checkmarx is the global leader in software security solutions for modern application development. Checkmarx delivers the industry’s most comprehensive software security platform in Checkmarx One. It’s a platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer application security awareness and training programs to reduce and remediate risk from software vulnerabilities.
Checkmarx is trusted by more than 40 percent of the Fortune 100 and half of the Fortune 50, including leading organizations such as SAP, Samsung, and Salesforce.com.
Learn More
gold
CrowdStrike
CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Learn More
gold
CloudBees
Every business is a software business, and is under pressure to innovate constantly. This increased velocity introduces new business risks. CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.
Learn More
gold
Delphix
Delphix is the industry leader for DevOps test data management.
Businesses need to transform application delivery but struggle to balance speed with data security and compliance. Our DevOps Data Platform automates data security, while rapidly deploying test data to accelerate application releases. With Delphix, customers modernize applications, adopt multi-cloud, achieve CI/CD, and recover from downtime events such as ransomware up to 2x faster.
Leading companies, including Choice Hotels, Banco Carrefour, and Fannie Mae, use Delphix to accelerate digital transformation and enable zero trust data management. Visit us at www.delphix.com. Follow us on LinkedIn, Twitter, and Facebook.
More from Delphix:
Continuous Compliance Data Sheet
Protect Sensitive Data and Ensure Compliance with Data Privacy Regulations
Learn More
gold
Lacework
Lacework is the data-driven security platform for the cloud. The Lacework Polygraph Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization’s AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer and consolidate point security solutions into a single platform.
Learn More
gold
Sonatype
We are laser focused on helping organizations continuously harness all of the good that open source has to offer, without any of the risk. In order to do this, we have invested in knowing more about the quality of open source than anyone else in the world. This investment takes the form of machine learning, artificial intelligence, and human expertise, which in aggregate produces highly curated intelligence that is infused into every Nexus product. Organizations equipped with Nexus products make better decisions, innovate faster at scale, and rest comfortably knowing that their applications always consist of the highest quality open source components.
Learn More

silver
Recorded Future
Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so businesses can be conducted with confidence. Recorded Future is trusted by hundreds of businesses and government organizations around the world. Learn more at www.recordedfuture.com
Learn More
silver
StreamSets
StreamSets, a Software AG company, eliminates data integration friction in complex hybrid and multi-cloud environments to keep pace with need-it-now business data demands. Our platform lets data teams unlock data—without ceding control—to enable a data-driven enterprise. Resilient and repeatable pipelines deliver analytics-ready data that improve real-time decision-making and reduce the costs and risks associated with data flow across an organization. That’s why the largest companies in the world trust StreamSets to power millions of data pipelines for modern analytics, AI/ML, smart applications, and hybrid integration.
More From StreamSets:
Learn More
silver
LMNTRIX
LMNTRIX is the leader in intelligence led security-as-a-service. Working as a seamless, scalable extension of customer security operations, LMNTRIX offers a single MDR solution called Active Defense that blends their cyber defense platform called LMNTRIX XDR with innovative security technologies, nation-state grade threat intelligence and world-renowned Cyber Defence Centers. With this approach, LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.
Learn More