The SINC TOLA IT & Security Leaders Forum brings together top leaders for three days of engagement geared specifically towards our IT executives.
Forum speakers and presentations will focus on topics most directly impacting attendee resource challenges, which will in turn drive regional industry growth. Executives and service providers alike will engage through one-on-one engagements and open-discussion group meetings, all while creating valuable networking and community-building opportunities to foster regional development.
Gaylord Texan Resort & Convention Center
Standing on the shores of the majestic Lake Grapevine, Gaylord Texan Resort & Convention Center welcomes guests to a stunning, one-of-a-kind experience. Guests can explore the four-and-a-half acres of airy, indoor garden atriums, four award-winning restaurants, bars, the world-class Relâche Spa, and a state-of-the-art fitness center. Located near DFW Airport, LEGOLAND® Discovery Center, Cowboys Golf Club, Historic Downtown Grapevine, and water sports on Lake Grapevine itself, are all convenient so everyone can do more of what they love.
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 PM - 5:00 PM CST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM CST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:55 AM CST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM CST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:45 AM CST
MASTER OF CEREMONIES - KEYNOTE PANEL - Top 10 Priorities for the CIO & CISO
Check back for updates on this session.
Moderator: Bryan Tutor, CIO & Executive Counselor, Info-Tech Research Group
Panelists:
Nellson Burns, Managing Partner, Destination IT
Mark Walters, Trial Lawyer
8:55 AM - 9:35 AM CST
Presentation - Systems of Experience: The CIO's Role in the Future of Work
The definition of work-life balance has changed, and the nature of work has changed. Life, family, and work are all integrated, we need software solutions that allow us the flexibility to live our lives and attract a diverse talent. Solutions that improve experience locally while allowing us to operate globally removing the friction, increasing productivity improving employee experience and in turn positively impacting the customer experience. Focused on retention and customer satisfaction.
Speaker: Matt Lehman, Industry Principal, Financial Services, RingCentral
Presented by: RingCentral
9:35 - 9:55 AM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
9:55 - 10:25 AM CST
WORKSHOP 1 - Using iPaaS to Drive your API Connectivity Needs
APIs are everywhere. There are APIs for 150k+ SaaS Apps, APIs for blockchain, IoT, artificial intelligence, and everything in between. Yet, at the same time, companies are finding themselves challenged to make timely, informed decisions because of scattered data. You could, in theory, stitch APIs together with existing systems to integrate and create exciting new applications, but how do you determine what tool you need to help you connect your systems and data sources? Or how do you know if you need an iPaaS or an API Management (APIM) platform?
The proliferation of applications and data sources used everyday has made it imperative for organizations to consider an integration solution that incorporates full lifecycle API Management capabilities. The combined power enables organizations to surface and share data quickly from any number of disparate sources so users can make informed, impactful decisions in real-time.
Join us for a 30-minute workshop to learn how your internal systems can be securely exposed as APIs with minimal effort using the Jitterbit Harmony platform. Watch us demonstrate live how you can create APIs through just simple clicks vs coding from scratch, enabling your customers to access data faster and make timely and informed decisions by leveraging Jitterbit API Management.
Key take-aways from this session:
- Extend the value of Jitterbit Harmony API Integration platform by enabling your data to be shared between apps in real-time
- Manage and expose APIs created from Harmony projects
- Perform full lifecycle API Management capabilities, including creating, consuming and controlling APIs through an intuitive, low-code user interface
- Securely expose your 3rd-party APIs through the Harmony platform and manage all your APIs from one place
Speaker: Tomydas Pall, Senior Product Manager, Jitterbit
Presented by: Jitterbit
9:55 - 10:25 AM CST
WORKSHOP 2 - How Organizations Can End the Era of Security Control Failure
Imagine a World Cup qualifying team that made it to the first match but had failed to prepare for its opponents. Stepping out on the pitch, the opposing team would run circles around them. This is the story in cybersecurity today. The impact of a lack of continuous security control validation is that security programs fail and breaches occur constantly. Only by testing controls against known threats can teams generate the data they need to understand performance, tune-up, and improve effectiveness.
In this talk, Jose will cover how the research team discovered that EDR controls in AttackIQ’s customer environments only stopped top adversary techniques 39 percent of the time, and outline recommendations for how to improve cybersecurity program performance at scale.
In their analysis, the AttackIQ Adversary Research Team selected real-world adversary techniques from MITRE ATT&CK under the following criteria, including: (1) they needed to be common techniques (not edge cases); (2) they needed to have had pronounced historical impacts, including in recent Russian operations in Ukraine; and (3) most importantly, the EDR solution providers needed to consistently block these key techniques in AttackIQ’s lab environment. The goal in selecting these techniques was to find a sweet spot for realistic and popular techniques that could be prevented by recommended security configurations but are not currently being prevented most of the time in customer environments.
Attendees will leave the talk with a deeper understanding of why advanced cyberdefenses fail against threats and how organizations can use automated testing and the MITRE ATT&CK framework to improve their overall security program performance.
Speaker: Jose Barajas, VP, Global Sales Engineering, AttackIQ
Presented by: AttackIQ
10:35 AM - 11:05 AM CST
WORKSHOP 1 - Analytics Architecture Principles for Performance and Growth on a Budget
When building or changing an enterprise analytics architecture, there are a lot of things to consider–Cloud or on-prem, hybrid or multi-cloud, this cloud or that cloud, containerized, build tech, buy tech, use the skills in house, train new skills, etc. While balancing those decisions, there are a lot of considerations, but the main three are performance, costs, and planning for the future including future growth in analytics demand.
Learn how several companies like the Index Exchange, Simpli.fi, Philips, and the Tradedesk analyze data from a single terabyte up to multiple petabyte ranges, track millions of realtime actions, generate 10’s of thousands of reports a day, keep thousands of machine learning models in production and performing, and still keep budgets under control.
In this session:
- Discover the high-level principals that underly every decision around building a data analytics architecture for performance and rapid growth, without breaking the budget
- Evaluate examples of successful analytic data architectures at several companies that are tackling some of the toughest analytics use cases.
- Learn from others’ mistakes and successes managing and analyzing data with multiple simultaneous workloads, exponential growth, spikey workloads, or hundreds of concurrent users.
Speaker: Paige Roberts, Open Source Relations Manager, Vertica by OpenText
Presented by: Vertica by OpenText
10:35 AM - 11:05 AM CST
WORKSHOP 2 - Cultivating Developer Security Adoption
Security programs have undergone major changes in recent years, to adapt to the changes that Agile development, DevOps pipelines, and faster deployments bring. New DevSecOps programs and models have resulted in a significant security ownership shift to the development teams. But in order for development teams to truly take responsibility for security, they need to embrace and adopt the new security practices. This is no easy feat! It introduces many organizational, process, and tooling challenges. In this session, we will discuss how others have successfully achieved this, and talk about tips and best practices on how you can improve the developer adoption of your security needs, as well as common pitfalls or problems to avoid.
Speaker: Jim Armstrong, Sr. Director, Product Marketing, Snyk
Presented by: Snyk
11:10 - 12:00 PM CST
ROUNDTABLE & PANEL - Driving The Business Through Technology
It is no secret that technology is changing the fabric of business operations and outcomes, and collaboration between IT and the business is more important than ever before. The conversation is no longer about how to align IT with the business, however in many cases technology is still viewed as a commodity rather than an enabler. So what can we do to successfully change this mindset both within our own organizations and across the industry as a whole? During this session, we will discuss the various challenges IT and digital leaders face when undergoing this cultural shift.
Moderator: Ross Tucker, CIO, Texas United Management Corporation
Panelists:
Lucy Mariappa, CIO, International Leadership of Texas
Damian Mobley, CTO, IM Academy
Marc Paige, VP, GC Services
Rinkesh Patel, VP, Fidelity Investments
12:00 - 12:50 PM CST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan and vegetarian options available.
1:00 - 1:30 PM CST
WORKSHOP 1 - Avoiding Burnout with a Mental Healthcare Plan
Check back for updates on this session.
Speaker: Michael Anderson, CISO, Dallas ISD
1:00 - 1:30 PM CST
WORKSHOP 2 - How to Survive a Ransomware Attack and Live to Tell About It
Ransomware is no longer just a problem for businesses and industries. Many school districts are now the target of ransomware attacks. But they assume they aren’t at risk and end up having to respond to a ransomware attack without proper preparation and plans in place. Get firsthand information and hear lessons learned from one district’s ransomware incident this year. Be better prepare and secure your staff, hardware, data, and network.
Speaker: Brad Stewart, CTO, Lufkin ISD
1:40 – 2:10 PM CST
WORKSHOP 1 - Security Validation as the Heart of Exposure Management
To increase security readiness given today’s dynamic attack surfaces and diverse cyberthreats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments.
Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary’s view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls.
During this session, we will present a pragmatic approach to implementing an Exposure Management strategy, focusing on automated security validation.
Speaker: Autumn Stambaugh, Senior Solutions Engineer, Pentera
Presented by: Pentera
1:40 - 2:10 PM CST
WORKSHOP 2 - Redefining Cloud, Data, and Network Security to Apply Zero Trust Architecture
The overall business transition to the Cloud is happening far faster than many experts predicted. That speed has left most companies reliant on security platforms built for a bygone world dominated by on-premises data centers. The covid pandemic further accelerated and complicated the situation, stressing CISOs and CIOs who are responsible for protecting a work-from-home staff that may not ever fully return to the office. Organizations are rapidly adopting SASE to safeguard data wherever it moves, support digital transformation efforts, and realize better efficiency and ROI from their technology. Come hear how Netskope’s converged SASE platform provides AI-driven zero trust security and simplified, optimized connectivity to any network location or device, including IoT.
Speaker: Gerry Plaza, Field CTO, Netskope
Presented by: Netskope
2:20 - 2:50 PM CST
WORKSHOP 1 - Minimizing Risk From Cyber Threats: Focus on Reducing Time to Containment
The threat landscape continues to evolve rapidly, and attacks are getting more sophisticated every day. Many organizations can no longer cope with the volume of alerts to the extent that 93% of organizations confirmed that they couldn’t respond to new alerts within the first 24 hours. As a result, the Mean-Time-To-Detect (MTTD), and Mean-Time-To-Respond (MTTR), which are two of the primary metrics for any Security Operations Center (SOC), continue to increase for the majority of organizations. In this session, we will discuss some of the main challenges that result in alert fatigue and an increase in MTTD and MTTR metrics and how Artificial Intelligence can play a vital role in driving efficiency for your team.
Speaker: Mani Keerthi Nagothu, Field CISO, Americas, SentinelOne
Presented by: SentinelOne
2:20 - 2:50 PM CST
WORKSHOP 2 - Data for DevOps: The Intersection of Data Automation & Data Security
Innovation driven by DevOps, cloud and AI/ML emboldens businesses to expand access to the essential fuel for those programs– enterprise data. At the same time, stringent privacy laws and frequent cyber attacks increase pressure to mitigate sensitive data risks. With more and more interaction shifting to the digital brand experience, how can today’s enterprises effectively unlock the power of their enterprise data and eliminate friction between data usage and data security?
Join this interactive session to discuss the cultural shift modern enterprises are actively engaged in to make data more available, secure, compliant and resilient.
Speakers:
Brandon Burge, Director IT, Express Scripts
Corey Brune, Senior Principal Solutions Engineer, Delphix
Presented by: Delphix
2:50 - 3:05 PM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:05 - 3:45 PM CST
PRESENTATION - How to Maximize ROI on Digital Investments with Value Stream Management and FinOps
As macro-economic concerns increase in 2023, organizations are looking to drive higher ROI from digital investments. Value Stream Management helps DevOps teams accelerate time to market and build on success by unifying your organization’s business and technology objectives. But accelerating revenue must be accompanied by optimized operational expenditures in order to maximize ROI. That’s where FinOps comes in.
In this session, you’ll learn how OpenText simplifies Value Stream Management by helping organizations track, analyze, and predict resourcing, reduce risk, and identify waste to help you increase value as a product flows from “strategy to delivery” to achieve superior business outcomes. Then you’ll learn how FinOps can help you optimize the cloud costs that are driven by agile development through a three-step approach: Inform, Optimize and Operate. This will enable you to:
- Maximize Business Value and Effectiveness: Discover, visualize, and manage the flow of value from “strategy to delivery” powered by AI and analytics that is easy to deploy.
- Accelerate Delivery and Efficiency: Integrate with your existing toolchains to improve productivity and remove friction in the value stream with smart automation.
- Gain Competitive Advantage: Differentiate customer experience with high-quality value stream insights to manage risk and streamline delivery. Empower continuous feedback, learning, and improvement.
Join OpenText to learn why the time for a joint VSM/FinOps approach is now and how to capitalize on it the easy way.
Speakers:
Parker Reguero, Enterprise Sales Director, ADM West, OpenText
Travis Greene, Sr. Director of Product Marketing, OpenText
Presented by: OpenText
3:50 - 4:40 PM CST
ROUNDTABLE & PANEL - Diving into Talent Acquisition, Diversity and Retention
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough women and minorities into the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us at the roundtable with your peers as we dive into solutions to tackle the following challenges:
- How do you scale staff/team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought Old vs New Thinking?
- How do we mentor universities to implement actionable steps for supplying more IT talent?
Moderator: Helen Knight, Founder & CEO, Helen Knight Consulting
Panelists:
Charles Ahn, Director of SAP Technology Integration and Enablement, Kimberly-Clarke
Angela McGuire, VP of Digital Financial Services, Worldlink
Nickoria Johnson, Chief Diversity Officer, Credera
Robert Pace, VP & CISO, Invitation Homes
4:50 - 5:20 PM CST
WORKSHOP 1 - Having a Culture of Data Security isn’t as Hard as You Think
For years, organizations have struggled to meet the requirements of regulatory compliance, incident response, security, and best practice for their critical data.
And now, with the huge upsurge and modernization of business applications and the pressure to migrate to the cloud or to manage a hybrid environment, data security, and compliance requirements are evolving to the point where traditional solutions are no longer enough to provide every answer, and the demand for a modernized data security solution is growing .
Modern Data Security requires:
- Support for any location, Multi-cloud, on-prem, both.
- Coverage for any data type
- Convergence of Legal, Risk, IT and Security
- Augmenting hard to find expertise
- Building Data security into Business Processes
Join Imperva’s Terry Ray to learn what to consider when modernizing your data security solutions to meet the constantly changing security challenges of the modern enterprise
Speaker: Terry Ray, SVP Data Security GTM, Field CTO and Imperva Fellow, Imperva Inc
Presented by: Imperva
4:50 - 5:20 PM CST
WORKSHOP 2 - API Security: How Are You Securing the #1 Attack Vector?
No surprise in the era of digital transformation: In its API Security and Management report, Gartner predicts that by 2023, API abuses will move from infrequent to the most frequent attack vector, and by 2025, more than 50% of data theft will be due to unsecure APIs. And yet many security leaders, when pressed, do not even know how many APIs they have in their environments – never mind their level of security. So, what are you doing proactively to protect your environment from API vulnerabilities, design flaws, and misconfiguration?
Join the Noname Security session on API security to discover:
- How are adversaries exploiting API security gaps to launch successful attacks?
- What are the top API vulnerabilities, and how are proactive enterprises mitigating them?
- How can API visibility be enhanced for automated monitoring, detection, and response?
Speaker: Henry Obialisi, Director, Solutions Architects West, Noname Security
Presented by: Noname Security
6:00 - 7:00 PM CST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 - 9:00 PM CST
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:55 AM CST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:40 AM CST
CISO PANEL - The Ongoing Shift in Protecting our Networks
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
Moderator: Erik Boemanns, VP of Technology, Cybersecurity, Improving
Panelists:
Sujeet Bambawale, VP & CISO, 7-Eleven
Ted Layne, CISO/CSO, Fairway Independent Mortgage Corporation
Ray Texter, CISO, Texas United Management Corporation
Keith Donnelly, VP, Global Head of Risk Management, Broadridge Financial
David Mata, SVP, Global Head of Incident Management, Darktrace
9:50 - 10:20 AM CST
WORKSHOP 1 - Supply Chain – The Real Insider Threat
What if I told you that 80% of the source code for your application was written by strangers? Furthermore, your developers have implicitly invited those strangers to help on your digital transformation projects. By downloading and using open source libraries, you have decreased your time to market. What has it done to your risk? What governance do you have over open source in your enterprise, and can you detect if something is wrong?
Incidents such as the recent Log4J CVE, have reminded us that while not malicious, these libraries can be misused to attack us. If you were impacted by this event, you should have some idea of how mature your organization is and made some decisions on how to improve. Your ability to respond in a timely manner to these situations is critical.
Today we are seeing the rise of the criminal coder. Through various means, they are injecting open source software with malicious code. The ecosystem for sharing these libraries was created to share easily, not securely. Using some traditional attacks as well as some that are novel and unique to each ecosystem, they have put your company at risk.
Your ability to detect and react to this new threat landscape has three components:
- Telemetry that alerts you to the suspicious and malicious software that your developers have inadvertently selected and integrated
- The quality and maturity of your incident response playbook
- The hygiene of your development organization and its ability to make production changes quickly and safely
Join us to learn about these topics and bring real improvements back to your workplace.
Speaker: Peter Chestna, CISO of North America, Checkmarx
Presented by: Checkmarx
9:50 - 10:20 AM CST
WORKSHOP 2 - In The Know: Coping with Recession Concerns on IT Spending
Concerns of a Recession looms whether there results in one or not. With a war raging across the ocean, a potential European energy crisis this winter, and inflation numbers in the US refusing to subside, the macroeconomic environment has caused enterprise IT leaders to rethink their strategies. Learn how your peers are changing their plans to deal with the recession.
Speaker: Eric Helmer, Chief Technology Officer, Rimini Street
Presented by: Rimini Street
10:20 - 10:35 AM CST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:40 - 11:10 CST
WORKSHOP 1 - Shift Left, the Right Way
The current “shift-left” mindset to assess, assert, and evidence compliance and to harden the software supply chain are a DevOps antipattern. The impact goes well beyond over-burdening developers with toil that distracts them from innovation, unplanned audits are highly disruptive, and management is left to make decisions without defensible data. We will discuss this impact as a tax and suggest attributes of solutions to do Shift-Left right.
Speaker: Tim Johnson, Senior Product Marketing Manager, CloudBees
Presented by: Cloudbees
10:40 - 11:10 CST
WORKSHOP 2 - New Techniques Emerge via High Profile eCrime Attacks
Review of Scattered Spider and Slippy Spider, the updated attack techniques observed, and changes in the eCrime landscape
Speaker: Aaron Ausherman, Sales Engineering Manager, CrowdStrike
Presented by: CrowdStrike
11:15 - 12:00 PM CST
PRESENTATION - Inclusive Leadership: Keys to Modern Leadership
Check back for updates on this session.
Speaker: Nickoria Johnson, Chief Diversity Officer, Credera
12:00 - 1:00 PM CST
SINC NETWORKING LUNCH
Serving food for all tastes, pallets, and preferences. Vegan and vegetarian options available. Serving to-go boxes for those in a hurry!
TOLA Executive Advisory Council

Radhika Murudeshwar
Director Enterprise Architecture - Clinical
UnitedHealth Group

Ross Tucker
CIO
Texas United Management Corporation

Dana Prochaska
Executive Security Advisor / vCISO
Freelance

Jeff Baker
CIO
NB Business Solutions

Rusty Kennington
CIO
Henry Company

Sudhakar Virupakshi
CIO
Buckeye Partners

Robert Pace
CISO
Invitation Homes

Shivani Agarwal
Head of IT
McLane Company

Tod Huber
CTO
Milwaukee County

Bhadresh Patel
Chief Technology Officer
Humana
Interested in speaking? Please submit a request.
Submit RequestInterested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor

platinum
OpenText
OpenText has completed the purchase of Micro Focus. We are excited to provide expanded offerings to support our customers’ growing needs to digitize and work smarter. The world of information management just got stronger. We are now 25,000 experts strong making us better able to help our customers and fuel our innovation. OpenText powers and protects information to elevate every person and every organization to be their best.
More from OpenText:
Transform Software Delivery with ValueEdge
How Value Stream Management Gives Your Enterprise a Competitive Edge
Learn More
platinum
RingCentral
RingCentral, Inc. (NYSE: RNG) is a leading provider of business cloud communications and contact center solutions based on its powerful Message Video Phone (MVP ) global platform. More flexible and cost-effective than legacy on-premises PBX and video conferencing systems that it replaces, RingCentral empowers modern mobile and distributed workforces to communicate, collaborate, and connect via any mode, any device, and any location.
RingCentral offers three key products in its portfolio including RingCentral MVP , a Unified Communications as a Service (UCaaS) platform including team messaging, video meetings, and cloud phone system; RingCentral Video , the company’s video meetings solution with team messaging that enables Smart Video Meetings; and RingCentral Cloud Contact Center solutions. RingCentral’s open platform integrates with leading third-party business applications and enables customers to easily customize business workflows. RingCentral is headquartered in Belmont, California, and has offices around the world.

gold
AttackIQ
AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with the MITRE Engenuity.
Learn More
gold
Vertica by OpenText
Vertica by OpenText is the fastest, most advanced SQL analytics database, available on-premise, on Hadoop, and multiple clouds – all delivered via one unified platform. With tight integration with Hadoop, Kafka, and Spark, and built-in advanced analytics and Machine Learning, Vertica delivers the highest performance at extreme scale. Vertica. Built for fast. Built for freedom.
Learn More
gold
Snyk
Snyk is the leader in developer security. They empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Their developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce.
More from Snyk:
CISOs Guide to Cultivating Developer Security
Learn More
gold
Pentera
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
Learn More
gold
Jitterbit
Jitterbit is the API transformation company that accelerates innovation by combining the power of APIs and integration. The Jitterbit API integration platform enables companies to rapidly connect SaaS, on-premise and cloud applications and instantly infuse artificial intelligence into any business process. With Jitterbit, integration moves at the speed of business as needs evolve.
More from Jitterbit
For more information about Jitterbit Harmony, please visit: https://www.jitterbit.com/harmony/
Learn More
gold
Netskope
Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Learn More
gold
SentinelOne
SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation, and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks.
Learn More
gold
Cloudbees
Every business is a software business, and is under pressure to innovate constantly. This increased velocity introduces new business risks. CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.
Learn More
gold
Checkmarx
Checkmarx is the global leader in software security solutions for modern application development. Checkmarx delivers the industry’s most comprehensive software security platform in Checkmarx One. It’s a platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer application security awareness and training programs to reduce and remediate risk from software vulnerabilities.
Checkmarx is trusted by more than 40 percent of the Fortune 100 and half of the Fortune 50, including leading organizations such as SAP, Samsung, and Salesforce.com.
Learn More
gold
Noname Security
The Noname API Security Platform is the only solution to proactively secure your environment from API security vulnerabilities, misconfigurations, design flaws, and provides API attack protection with automated detection and response.
More From Noname Security:
The Noname API Security Platform
Learn More

gold
Delphix
Delphix is the industry leader for DevOps test data management.
Businesses need to transform application delivery but struggle to balance speed with data security and compliance. Our DevOps Data Platform automates data security, while rapidly deploying test data to accelerate application releases. With Delphix, customers modernize applications, adopt multi-cloud, achieve CI/CD, and recover from downtime events such as ransomware up to 2x faster.
Leading companies, including Choice Hotels, Banco Carrefour, and Fannie Mae, use Delphix to accelerate digital transformation and enable zero trust data management. Visit us at www.delphix.com. Follow us on LinkedIn, Twitter, and Facebook.
More from Delphix:
Guide to Zero Trust DevOps TDM
Learn More
gold
Imperva
Imperva is the comprehensive digital security leader on a mission to help organizations protect their data and all paths to it. Only Imperva protects all digital experiences, from business logic to APIs, microservices, and the data layer, and from vulnerable, legacy environments to cloud-first organizations. Customers around the world trust Imperva to protect their applications, data, and websites from cyber attacks. With an integrated approach combining edge, application security, and data security, Imperva protects companies ranging from cloud-native start-ups to global multi-nationals with hybrid infrastructure. Imperva Threat Research and our global intelligence community keep Imperva ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions.
Learn More
gold
Rimini Street
More than 4,900 Fortune 500, Fortune Global 100, midmarket, public sector and other organizations from a broad range of industries have relied on Rimini Street as their trusted application enterprise software products and services provider. To learn more, please visit www.riministreet.com.
Learn More
gold
CrowdStrike
CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
More From CrowdStrike:
Learn More
gold
Darktrace
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it.
Learn More
silver
Recorded Future
Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so businesses can be conducted with confidence. Recorded Future is trusted by hundreds of businesses and government organizations around the world. Learn more at www.recordedfuture.com
Learn More
silver
StreamSets
StreamSets, a Software AG company, eliminates data integration friction in complex hybrid and multi-cloud environments to keep pace with need-it-now business data demands. Our platform lets data teams unlock data—without ceding control—to enable a data-driven enterprise. Resilient and repeatable pipelines deliver analytics-ready data that improve real-time decision-making and reduce the costs and risks associated with data flow across an organization. That’s why the largest companies in the world trust StreamSets to power millions of data pipelines for modern analytics, AI/ML, smart applications, and hybrid integration.
More from StreamSets:
Learn More
silver
Okta
Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 10,000 organizations, including JetBlue, Nordstrom, Siemens, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.
Learn More