By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the West IT & Security Leaders Forum and leave ready to inspire action within your Organization!
M Resort Spa Casino
Nestled in the quiet city of Henderson at the southern end of the Las Vegas Valley, the Forbes Travel Guide Four-Star and AAA Four-Diamond M Resort Spa Casino captures a unique sense of place with its distinctive desert scape location in one of the world’s most exciting cities. The hotel also offers complimentary valet parking services, laundry, a 24-hour front desk and concierge, resort pool with private cabanas, eight restaurants including a rooftop cocktail lounge with outdoor terrace, 24-hour room service, daily newspaper delivery, turndown services, and extensive banquet spaces.
Forum Agenda
Agenda may be subject to change. Click on each day to view full agenda
2:00 PM - 5:00 PM MT
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM MT
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM MT
SINC NETWORKING & ENGAGEMENT DINNER
7:30 AM - 8:25 AM MT
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:30 AM - 8:35 AM MT
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:35 AM - 9:25 AM MT
PANEL - Enabling the Institution for the Digital Economy: Key Future Trends
As the digital economy continues to expand, institutions must adapt to remain competitive and relevant. This session will explore the key trends shaping the future of the digital economy and how institutions can effectively enable their digital transformation. Topics will include advancements in digital infrastructure, the integration of artificial intelligence and machine learning, the importance of data analytics, and the shift towards digital-first business models. Experts will discuss the challenges and opportunities presented by these trends, providing practical insights on how institutions can leverage technology to enhance efficiency, innovation, and customer engagement. Attendees will gain a comprehensive understanding of the strategic steps necessary to thrive in the digital economy.
9:35 AM - 10:05 AM MT
WORKSHOP 1 - Identity, the New Perimeter and Key to Security Success
In today’s digital landscape, the traditional network perimeter has dissolved. Identity has emerged as the new security perimeter, representing the most critical attack surface for adversaries. As organizations increasingly adopt cloud-based services, remote workforces, and interconnected applications, managing identities and Identity Providers (IDPs) has become central to ensuring security. However, these same identities are also being targeted, manipulated, and abused by cybercriminals to gain unauthorized access to valuable data and resources.
This session will explore the evolving role of identity in cybersecurity, providing a deep dive into how identities and IDPs are leveraged—both legitimately and maliciously. Attendees will gain a comprehensive understanding of the Zero Trust model and why it is essential for today’s security strategy. We will discuss common security failures, such as overprivileged access, poor password hygiene, and inadequate monitoring, and identify tools and best practices that can help organizations strengthen their identity security posture.
Participants will walk away with actionable insights on how to better protect identities, implement effective Zero Trust principles, and adopt identity-focused security strategies that mitigate risks in an ever-evolving threat environment. Armed with these best practices, security leaders will be well-equipped to build resilient defenses against today’s most sophisticated cyber threats.
Presented by: Tenable
9:35 AM - 10:05 AM MT
WORKSHOP 2 - A New Paradigm for Managing Third-Party Risk
In the past 12 months, 87% of F1000 businesses were affected by significant cyber incidents as a result of a third-party. And yet, most rely on ‘snapshot in time’ questionnaires. While necessary, snapshots are insufficient by themselves, and must be augmented with continuous monitoring in support of ongoing security operations. This requires a different approach, that includes external threat detection capabilities by using AI across Public Data.
- The Public Data opportunity: collect, process, alert across multiple languages / modalities
- Real-time external threat detection on a rapidly evolving threat landscape
- The most advanced AI techniques for automating the collection, processing, delivery, and initial analysis of millions of public data sources
Presented by: Dataminr
10:15 AM - 10:45 AM MT
WORKSHOP 1
10:15 AM - 10:45 AM MT
WORKSHOP 2 - Navigating the Evolution of Cybersecurity: AI's Role in Securing Your Infrastructure from Past to Future
In the ever-evolving landscape of cybersecurity, staying ahead of threats is imperative. As we reflect on the past, embrace the present, and prepare for the future, the integration of artificial intelligence (AI) into security infrastructure has emerged as a disruptive technology in safeguarding digital assets. Join us at this exclusive event led by Trend Micro as we delve into the dynamic journey of AI’s impact on cybersecurity. From historical insights to current advancements and future projections, discover how AI is reshaping the defense mechanisms against cyber threats, fortifying your infrastructure, and empowering organizations to navigate the digital frontier with confidence.
Presented by: Trend Micro
10:45 AM - 11:00 AM MT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
11:05 AM - 11:35 AM MT
WORKSHOP 1 - Not Your Grandparent's AI: New Age of Cybersecurity and IT Management
Join us for an engaging and insightful journey through the evolution of AI, from the pioneering days of Turing to today’s cutting-edge generative models. In “Not Your Grandparent’s AI: New Age of Cybersecurity and IT Management,” we explore how AI is revolutionizing IT operations and cybersecurity, transforming our approaches to data analysis, threat detection, and endpoint management. We’ll delve into the emotional rollercoaster of technology adoption, address the new risks posed by generative AI, and discuss how to balance the need for speed and real-time data with security imperatives. This talk will equip you with a deeper understanding of the current landscape and future trajectory of AI in our industry. Come discover how to harness AI’s potential while navigating its challenges.
Presented by: Tanium
11:05 AM - 11:35 AM MT
WORKSHOP 2 - Redefining Secure Web Access: Transforming the Browser into the First Line of Defense
As organizations increasingly adopt web-based applications and remote work models, traditional security measures are proving insufficient to safeguard against modern threats. This session explores the transformative role of secure enterprise browsers in elevating web access from a potential vulnerability to a robust security advantage. Attendees will learn how innovative browser technologies can provide enhanced data protection, mitigate insider threats, and seamlessly integrate with existing security frameworks, ensuring both productivity and resilience in today’s dynamic digital landscape.
Presented by: Seraphic
11:45 AM - 12:30 PM MT
PRESENTATION - Using AI to Enhance Customer and Employee Journeys
In today’s dynamic business environment, companies face the imperative of delivering instant answers and assistance to customers engaging with digital channels. This informative discussion addresses the vital elements needed to produce tangible results to meet this demand. While AI tools and smart agents can minimize human intervention, professionals across sales, marketing, and customer service must navigate customer interactions and team collaboration in new ways. In this chat we will address the challenges to be aware of in the strategic deployment of these technologies and steps to take to ensure they deliver expected value.
Presented by: RingCentral
12:35 PM - 1:20 PM MT
PRESENTATION - Minutes to Meltdown: Navigating a High-Stakes Ransomware Attack
Join an intimate group of industry peers to experience a simulated cyber-attack, taking on a leadership role in a fictional company during a ransomware negotiation. Engage in a dynamic agenda with a realistic storyline inspired by recent high-profile breaches, confronting challenges and making critical decisions along the way.
Topics discussed:
- Security Assurance
- Identity and Access Management
- Social Engineering, Threat Detection
- Cyber Incident Response
- Ransomware
- Governance and Reporting Regulation in USA.
Guided by Commvault Security expert, attendees will navigate the ransomware journey and leave this session with an actionable toolkit and recommendations to evaluate their own company’s disaster recovery plan.
Our goal is for attendees to experience a realistic simulation of a complex cyber-attack scenario, enabling them to navigate demands and determine the next steps to protect their company’s data and restore business operations
Presented by: Commvault
1:25 PM - 2:15 PM MT
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, palates, and preferences. Vegan, vegetarian, halal options available
2:20 PM - 2:50 PM MT
WORKSHOP 1 - Exploring the Future of Cloud Networking: How to Optimize Performance, Security, and Scalability in an Increasingly Complex Multi-Cloud Environment
In today’s multi-cloud world, managing network performance, security, and scalability has become more complex than ever. Join us for an insightful discussion on the latest trends and strategies in cloud networking, where we’ll explore how to optimize your cloud infrastructure for maximum efficiency and resilience. Learn from industry experts about best practices and innovative solutions to navigate the evolving cloud landscape successfully. Don’t miss this opportunity to stay ahead of the curve in cloud networking!
2:20 PM - 2:50 PM MT
WORKSHOP 2 - AI-Driven SecOps: Revolutionizing Cybersecurity Operations
We’ll explore the transformative impact of Artificial Intelligence (AI) on Security Operations (SecOps). As cyber threats become more sophisticated and dynamic, traditional security models struggle to keep up. AI-driven SecOps leverages machine learning, automation, and advanced analytics to enhance threat detection, incident response, and overall security posture.
We’ll dive into how AI can identify anomalies faster than human analysts, automate repetitive tasks, and prioritize security incidents with greater accuracy. By reducing response times and improving decision-making, AI empowers security teams to be more proactive and efficient.
Speaker: Jeff Urnaza, Vice President of System Engineering, Majors, Fortinet
Presented by: Fortinet
2:55 PM - 3:25 PM MT
WORKSHOP 1 - Enhancing SaaS Security: Advanced Detection and Response Strategies with SaaS Security Posture Management (SSPM) to Protect Against Misconfigurations and Emerging Threats
With the growing reliance on SaaS applications, misconfigurations and emerging threats pose significant risks to your cloud environment. This session will dive into how SaaS Security Posture Management (SSPM) can provide advanced detection and response strategies to identify vulnerabilities, secure configurations, and respond to threats in real-time. Join us to gain actionable insights into strengthening your SaaS security posture and protecting your organization’s critical data.
Presented by: AppOmni
2:55 PM - 3:25 PM MT
WORKSHOP 2 - Your Roadmap to PCI v4 Compliance
Achieving PCI compliance is crucial for organizations handling payment card information, yet the process can be complex and challenging. This presentation explores the concept that a robust security framework is the foundation for achieving compliance, rather than compliance driving security measures. We will examine how prioritizing security best practices not only mitigates risks but also naturally aligns with regulatory and industry standards. Focusing on three core areas—Identity, Data security, and Application protection—offers the most efficient path to PCI compliance. By concentrating on these key areas, organizations can not only streamline their compliance efforts but also enhance their overall security posture. Attendees will leave with actionable insights on how to integrate these focus areas into their PCI compliance strategy to achieve both efficiency and effectiveness.
Presented by: Thales
3:35 PM - 4:05 PM MT
PRESENTATION - Mitigate Risk in the Age of AI
In this presentation we will provide insights around the inherent risks related to using Generative AI, self-trained LLMs and AI workloads. With data at the heart of any AI usage, we will cover efficient methodologies for identifying and mitigating your own risk to safely enable AI, making your workforce more productive and driving toward the innovation AI promises. Specifically the topic will engage the audience to consider how understanding the data set, its sensitivity, the access to it from internal employees to third parties, and how data will be used and created. Protecting data wherever it goes and ensuring compliance through the AI journey.
Learning Objectives: In this presentation the audience will learn about the inherent risks surrounding AI and therefore data within the enterprise. Marrying key objectives around cloud security, governance risk and compliance, risk management and threat detection/prevention through the AI lifecycle.
Presented by: Varonis
4:05 PM - 4:15 PM MT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
4:20 PM - 5:10 PM MT
PANEL - The CIO's Role in the Future of Work
As organizations adapt to technological advancements, remote collaboration tools, and changing workforce dynamics, the CIO emerges as a key strategist, orchestrating digital transformation initiatives and ensuring seamless integration of technology into the fabric of the modern workplace. This Panel will discuss how CIOs can drive innovation, enhance cybersecurity measures, and foster a flexible and inclusive work environment to meet the challenges and opportunities presented by the future of work.
5:20 - 5:50 PM MT
WORKSHOP 1 - Diving into Talent Acquisition, Diversity and Retention
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough woman and minorities in to the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us as we dive into solutions to tackle the following challenges:
- How do you scale staff / team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought – Old vs New Thinking?
- How do we mentor universities to implement actionable steps for supplying more IT talent?
5:20 PM - 5:50 PM MT
WORKSHOP 2 - Is Your Roadmap Business-Driven or Vendor Dictated?
Today, the primary CEO priority is growth, with technology as a key enabler. However, vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business. Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor’s. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.
6:00 PM - 7:00 PM MT
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM MT
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM MT
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM MT
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
10:00 AM - 10:30 AM MT
WORKSHOP - A Data Driven Journey: Insights and Lessons Learned
Everyone’s journey to being data-driven is unique. It’s like making an apple pie. It’s easy to get the ingredients, but you need to know how to put together the right recipe for a great apple pie. In this interactive discussion I will share insights and lessons learned in leading data modernization initiatives and in sharing the journey with customers. Data literacy, culture, governance, quality, technology stack modernization and architecture are all ingredients in driving towards the right data driven recipe. The discussion will include tips and tricks for reducing friction points and how to build the right recipe for your organization.
10:30 AM - 10:45 AM MT
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM MT
WORKSHOP - From On-Prem to the Cloud: Protect Your Apps and APIs
The result of digital transformation: It’s easier to do business with your customers and partners. But with new architectures, web apps and APIs now deployed from on-prem servers to the cloud, it is harder than ever to get a holistic view of all of these potentially vulnerable assets – never mind defend them.
What are your biggest challenges today in defending these diverse assets? What are the known gaps in your current defenses? What are you seeking in the future to defend your apps and APIs?
Topics covered will include:
- How are adversaries preying upon unprotected web apps and APIs?
- How are traditional web application firewalls deployed, and what are they missing?
- What does the future look like with unified web app and API security solutions?
11:30 AM - 12:00 PM MT
WORKSHOP - Maximizing Value Vs Minimizing Cost - Building a more Valuable IT Department
To meet the speed and agility demands of digital business, CIOs are transforming their IT departments and shifting a growing share of IT work from projects to products. At the same time, growth in business-led IT has expanded the span of employees across the enterprise who are responsible for technology initiatives.
This session will explore a cost management model and discuss how evolving IT cost management efforts to focus on value over pure cost will reduce (and even eliminate) reactive calls to cut IT costs. This session will provide a model and tactics to elevate the maturity of IT to focus on value over costs, while still meeting the business directives.
12:00 PM - 1:00 PM MT
SINC NETWORKING LUNCH
West Executive Advisory Council

Marc Mackey
Director of Global Technology PMO
Nike

Shawnna DelHierro
CTO
Sportsman Warehouse (Former)

Nadeem Iftikhar
Cyber Security Governance Leader
Kirkland

Roger Franke
Vice President of IT
Aramark

Elena Seiple
VP, CISO
Zillow

Niel Nickolaisen
CIO
Sorenson Communications

Paul Duchouquette
CIO
FDH Aero

Chris Stoneley
CISO
Cathay Bank

Robert Martin
CTO
Bridgepay Network Solutions

Vijay Mohnish
CTO
Ria Financial

Marcel Spitalnik
Director of Business Transformation
Danone

Adip Dsouza
VP of Technology
Merchants Mortgage & Trust Corporation

Sylvia Jessen
Director of IT
University of Utah School of Medicine
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor

platinum
RingCentral
RingCentral is a global leader in AI-powered trusted business communications, contact center, revenue intelligence, video and hybrid event solutions. RingCentral empowers businesses with conversation intelligence and unlocks rich customer and employee interactions to provide insights and improved business outcomes. With decades of expertise in reliable and secure cloud communications, RingCentral has earned the trust of hundreds of thousands of customers and millions of users worldwide.
Learn More
platinum
Commvault
Commvault (NASDAQ: CVLT) is the gold standard in cyber resilience, helping more than 100,000 organizations to uncover, take action, and rapidly recover from cyber attacks—keeping data safe and businesses resilient and moving forward. Today, Commvault offers the only cyber resilience platform that combines the best data security and rapid recovery at enterprise scale across any workload, anywhere with advanced AI-driven automation—at the lowest TCO.
Learn More
platinum
Varonis
Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient, and employee data; financial records; strategic and product plans; and other intellectual property.
The Varonis Data Security Platform detects cyber threats from both internal and external actors by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
Varonis products address additional important use cases including data protection, data governance, Zero Trust, compliance, data privacy, classification, and threat detection and response. Varonis started operations in 2005 and has customers spanning leading firms in the financial services, public, healthcare, industrial, insurance, energy and utilities, technology, consumer and retail, media and entertainment, and education sectors
Learn More
gold
AppOmni
AppOmni pioneered the SSPM category in 2018. Our mission is to prevent SaaS data breaches by securing the applications that power the enterprise. We deliver security that combines industry-leading threat research, expertise, and product depth, so our customers can enjoy secure SaaS productivity. See why over 25% of the Fortune 100, global enterprises and partners trust us.
Learn More
gold
SecurityScorecard
SecurityScorecard makes the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees, and vendors. SecurityScorecard is listed as a free cyber tool and service by the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Every organization has the universal right to its trusted and transparent Instant SecurityScorecard rating
Learn More
gold
Dataminr
Dataminr puts real-time AI and public data to work for our clients, generating relevant and actionable alerts for global corporations, public sector agencies, newsrooms, and NGOs. Our leading AI platform detects the earliest signals of high-impact events and emerging risks from hundreds of thousands of public data sources. Our real-time alerts enable tens of thousands of users at hundreds of public and private sector organizations across the globe to learn first of breaking events around the world, develop effective risk mitigation strategies, and respond with confidence as crises unfold.
Learn More
gold
Trend Micro
We’re a global cybersecurity leader, helping to make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints.
As a leader in cloud and enterprise cybersecurity, our platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response.
Learn More
gold
Tanium
Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium unifies teams and workflows and protects every endpoint from cyber threats by integrating IT, Operations, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale.
Learn More
gold
Tenable
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.https://www.tenable.com/
Learn More
gold
Seraphic
Seraphic is a unique browser security solution that protects enterprise assets and provides your security team with advanced governance and policy enforcement. It’s based on innovative technology – providing robust protection against all browser attacks, including full protection against zero-day and unpatched n-day attacks. Seraphic is easy to deploy, has no impact on performance, leaves user experience untouched, and is fully compatible across all browsers and devices.
Learn More
gold
Fortinet
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.
Learn More
gold
Thales
Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aeronautics & Space, and Cybersecurity & Digital identity. It develops products and solutions that help make the world safer, greener and more inclusive.
Learn More