Midmarket IT & Security Leaders 2022 Forum Agenda

Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!

Engage your Peers over canapes and cocktails

Open seating buffet meal serving 5 star food and great Peer engagement before Day 1 kick’s off

Full Breakfast and lots of coffee available!

A Thank You from SINC- setting the tone for a great day!

What ideas does an established and experienced CIO bring with them when entering a Midmarket organization? What are the priorities? How do you obtain company buy-in from the get go? How about attempting all of this during a global pandemic?

Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started? Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network.

Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Presented by: Illumio

Illumio

Circle back with your Peers on the content so far while grabbing a coffee and a snack

Today, the primary CEO priority is growth, with technology as a key enabler. However, vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business.

​Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor’s. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.

Check back for updates on this session.

Presented by: Progress Software

In 2021 we’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency.

Join this session to learn about:

  • Recent trends for protecting your organization from malicious attacks
  • Best practices to put your data in a better position mitigate and remediate against ransomware
  • Lessons learned from actual ransomware attacks
  • And more!

Presented by: Veeam

Veeam

In the debate over an all-in-one cyber security platform versus best of breed solutions, the overwhelming majority lean towards best of breed in order to leverage the most impactful technology. However, does true best of breed exist?

This session will look to explore this debate and how to implement a best of breed strategy when tech doesn’t necessarily integrate with other tech.

Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available

As businesses and organizations embrace their own digital transformation (DX) journey, change management becomes a critical success factor. However, success heavily depends on the people using the technology. Change management goes beyond acquiring an executive sponsor or providing staff training, it is about changing the mindset of the employees, impacts to their daily routine and how to operationalize it. The promise of rapid deployment and time to value hinge on having a strong change management program in place. How do we get change adopted across all levels of the company?

Small enterprises with constrained resources should design a service desk that optimizes the use of standardized processes and leverages self-service tools. This session will address adopting a set of processes that match your organization’s maturity and focus on service effectiveness and timeliness.

Check back for updates on this session.

Presented by: Recorded Future

Check back for updates on this session.

Presented by: Zoom

Check back for updates on this session.

Check back for updates on this session.

Circle back with your Peers on the content so far while grabbing a coffee and a snack

You’ve just stepped into your new IT leadership role. Your first 90 days in a new IT leadership role should be focused on learning. Investing this time will help you understand the current state, appreciate the culture and inform your strategy. Prioritize these steps to kickstart improvement:

  • Understand your job.
  • Learn the organization and industry you are in
  • Define and revise measurements for success
  • Articulate your vision and strategy
  • Organize people for success
  • Build culture
  • Revise processes for success & delivery, and suitable for the environment and the times
  • Upgrade technologies

Engage your Peers over canapés and cocktails

Open seating buffett meal serving 5 star food and great Peer engagement before Day 2 kicks off

Full Breakfast and lots of coffee available!

As part of its research process for the Cybersecurity Trends 2022 Report, Info-Tech Research Group conducted an open online survey among its membership and the wider community of professionals. The survey was fielded from August 2021 through to September 2021, collecting 475 responses. We asked some of the same questions as last year’s survey so we can compare results as well as new questions to explore new trends.

Presented by: Info-Tech Research Group

Check back for updates on this session.

Check back for updates on this session.

Looking ahead at the next 12 months, midmarket companies are most concerned with their cybersecurity strength. Industry research has found as businesses become more digital, these organizations believe security risks will increase in the next year. What steps should you take to avoid becoming the next victim?

Circle back with your Peers on the content so far while grabbing a coffee and a snack.

The business continues to believe in myths that impede the creation of an adequate disaster recovery plan (DRP).It is difficult to determine the required recovery time and points for each critical application and recovery processes are not well documented, resulting in an ad hoc approach to disaster recovery.

Mid-Market IT departments are so overburdened with managing the day-to-day that strategic thinking is often afterthought. All IT departments are limited by their capacity, but Mid-Market Organizations feel this constraint more than their counterparts and necessary strategic initiatives are neglected if their value and risk doesn’t translate to business terms.

Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available. Serving to-go boxes for those in a hurry!

End of Day

Interested in speaking?
Please submit a request below.