Meet the SINC team, receive all your registration collateral and receive a demonstration on how to best utilize the Forum mobile application during your attendance.
Take advantage of early networking opportunities with the aid of a cocktail reception and executive dinner. This is the perfect opportunity to break the ice with your fellow attendees and get conversations started in preparation for the main event.
SINC’s Chief Product Officer, Jason Cenamor, kicks things off and sets the tone for the day with insight in to the various sessions taking place and how to take full advantage of your participation.
Leaders driving transformation programs today are investing in customer experience, automation, agile practices, DevOps, and analytics to ensure competitiveness as industries transform. These are the table stakes for IT leaders, and they must drive smarter, faster, and innovative transformation programs to drive growth and profitability. Success will require IT leaders to empower their organizations with self service technologies, succeed with change management programs, and enable differentiating capabilities with a combination of artificial intelligence and IoT.
How are IT leaders must steer their transformation programs to succeed digital’s second wave?
A hybrid cloud strategy enhances business flexibility by allowing them to address their needs using a combination of public cloud, software as a service (SaaS) and in-house IT resources. This hybrid strategy is the new operating model for IT, proven to boost innovation, ensure compliance in the public cloud, while reducing overall complexity and keeping costs under control.
During this session, we will be discussing the reasoning behind a hybrid cloud strategy, its impact on operations, process, compliance and most importantly, your people
Session led by Nutanix
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. There are question marks over the sufficiency of legacy approaches to cyber security, which rely on knowledge of past attacks, to combat new, evolving attacks. A new approach to cyber defense is being deployed to detect and respond to these threats before they turn into a full- blown crisis.
In this session, we will discuss why autonomous response and machine learning is being seen as the future of defense and how the ‘immune system’ approach to cyber security can provide complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Session led by Darktrace
While finding talent today may not be as challenging, attracting and retaining them can be. We all too often focus on the upcoming generation titles and traits, trying to define what they want and how we can provide it. Finding the intersection of what your company can genuinely offer as an experience with what they want is the value proposition that defines acceptance or rejection. Chances are your people leaders today are of a different generation class, which may mean “flexible” is perceived more like “lazy.” How you connect these generations is the key to leading in the divide.
Speaker: Nathaniel Arnold, VP & CIO of the Americas, GE Gas Power
Most organizations implement Data Encryption Keys to secure data. However, how many are sure that their encryption is allowing interoperability with all of its clients to achieve their fullest business potential? That they are reaching their full business potential? OASIS KMIP(Key Management Interoperability Protocol) enables such opportunity yet not many organizations take advantage of this resource. In this session, the Speaker is going to discuss the current trends in the Data Encryption, options available in the market, advantages of OASIS KMIP, what enterprise architects must include when designing their products and solutions, and why we should demand KMIP compliant solutions from vendors.
Speaker: Skip Kimpel, CIO, 4R Restaurant Group
Is deception technology only for mature security operations or is it an effective cyber security solution to help companies mature their capabilities? Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. Learn how deploying decoys throughout your environment can build the bridge strengthening all the levels in your security stack. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what Red Teams are saying about deception-based threat detection.
Session led by Attivo Networks
CEO & Author Bart McDonough discusses the CIA (Confidentiality, Integrity, Availability) Triad and a back to the basics approach for protecting our information & systems
Speaker: Bart McDonough, CEO, Agio
How can access management keep up with a multi-vendor (AWS, Azure, GCP, OpenStack), multi-role (3rd party, developer, database admin) and multi-protocol (SSH/RDP/HTTPS) world where nothing is static? SSH.COM’s Jimmy Mills discusses why granting, revoking and managing access to the critical infrastructure needs innovation. Learn how identities are federated, access management is mostly automated with Zero Trust authentication, global cloud inventories auto-discovered, deployment is fast & scalable – and access is granted just-in-time, with the right amount of privilege for the task at hand.
As the importance of a robust security infrastructure continues to grow, many organizations are struggling, stuck in a notion that security hinders innovation. However, many would argue this is not the case and an effective cybersecurity platform can in fact accelerate innovation.
In this session, we will discuss how to utilize cybersecurity technologies and strategies to provide a bedrock of innovation across products and processes.
David Kosorok, Director of Application Security, Align
Janet Heins, CISO, Royal Caribbean Cruises Ltd.
It’s clear that while 5G presents a wealth of opportunity for innovation, but it will not be without its challenges. During this session we will explore the endless opportunities 5G can provide while covering the key steps to ensure you make the most out of this revolutionary change in the industry.
It’s no surprise that cloud computing has grown in popularity as much as it has, as its allure and promise offer newfound flexibility for enterprises, everything from saving time and money to improving agility and scalability. On the other hand, on-premise applications are reliable, secure, and allow enterprises to maintain a level of control that the cloud often cannot. But there’s agreement among IT decision-makers that in addition to their on-premise and legacy systems, they’ll need to leverage new cloud and SaaS applications to achieve their business goals.
Speaker: Kyle Parrish, Director – Technology Risk, Fidelity Investments
According to Gartner, the RPA market grew over 63% last year, making it the fastest growing enterprise software category. The beauty of RPA is that it enables customers to bring a level of automation to legacy processes without having to rip and replace legacy systems. But when, where and how should it be applied to ensure effective use?
Speaker: Susheel Nesargi, Head of Intelligent Automation, Banking Solutions, FIS Global
Organizations can no longer afford to make decisions without leveraging data driven insights derived from their enterprise systems and other data sources. Entire industries are transforming and innovating at unprecedented speeds, requiring businesses of all sizes to take actions and make smarter and faster decisions.
This session will focus on how to make smarter decisions and drive innovation through DataOps practices and what companies risk by not following this journey.
Session led by Info-Tech
Mobile devices are a critical tool for productivity in today’s mobile first, cloud driven world, but how are we protecting the data being accessed outside of the perimeter? With mobile proliferating across the enterprise, a new approach to security is required to address the newly emerging challenges and risks.
Session led by Lookout
Today, the primary CEO priority is growth, with technology as a key enabler. However, vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business. Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor’s. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.
Businesses have high expectations of their technical investment. New technologies must reduce costs, increase security, enhance productivity or improve workflows and communications. But despite the major role technology strategy plays, the relationship between the three pillars of IT, Security and the Business remains a challenge for many.
Dominic Vientos, Director – Infrastructure & IT Operations, Hibbett Sports, Inc.
Elliott Franklin, Director – IT Governance & Security, Leows Hotels & Co
David Kosorok, Director – Application Security, Concur
Frankie Ramos, CISO, DHL
SINC’s Chief Product Officer, Jason Cenamor, concludes the day by providing an overview of some of the key discussion points raised during a day packed full of content.
After a day packed with content, the Evening Reception provides attendees with the ability to down tools, cement relationships built during the day and enjoy a first-class meal.
Enterprises have hordes of data and many opportunities to integrate other data sources. But readying data for AI experimentation is expensive and requires an iterative approach.
This session will focus on finding the best opportunities to experiment with AI and on applying agile practices in machine learning initiatives.
Financial service institutions and online merchants have unique challenges when it comes to fraud and are facing ever-more-dangerous threats. Ken Chenis, Chief Architect at ACI Worldwide, will talk about how ACI is allowing banks and merchants to combat fraud affordably and effectively via a patent-pending method that makes data readily available to AI/Machine Learning on historic information yet also available in real time for live transaction processing. By using ACI’s Stream Analytic Engine and DataStax Enterprise to calculate and store features, ACI has been able to further reduce fraud for their customers by more than 26% while simultaneously also providing a 3% increase in acceptance rates. The combination of these improvements is returning millions of dollars in cost savings and added revenue for their customers.Speaker: Ken Chenis, Chief Architect, ACI Worldwide
The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today’s market leaders credit their speed and business advantages to their digital platform. Equinix will share insights into how global industry leaders deployed a digital edge by removing distance, leveraging edge & cloud computing, and interconnecting ecosystems.
Speaker: Lou Najdzin, Sr. Director – Field Development Americas, Equinix
Delivering endpoint security in an increasingly mobile environment comes with some major challenges. Growing businesses need to take a new approach to ensure they stay protected, to look after remote users and to do all these things while keeping costs down and reducing the administration overhead. This session will explore models which add new levels of reassurance to IT security by allowing companies of all sizes to gain access to the best equipment and most talented security experts.
Session led by New Signature
According to Flexera, 94% of IT operations are already using cloud technologies but 47% say that they have less control over application estate as it moves into the cloud. Clearly migrating to the cloud is not without its challenges. Many issues with cloud migration come from lack of implementing best practices. When migrating to the cloud, organizations failed to understand application dependencies before deploying or did not test everything before deploying or did not consider the effect consolidation, virtualization or cloud security would have on the infracture. In the end, struggles with cloud migration results in loss of end user visibility and costly performance degradations. In this session, find out the six steps to a successful cloud migration so you can gain back control and deliver on the promise of flawless end user experience.
Speaker: Mike Canney, Product Strategy, Accedian
Deena Swatzie, Vice President – IT Security & Compliance Risk, SunTrust
Ana Roldan, CISO, NOVA Southeastern University
As businesses and organizations embrace their own digital transformation (DX) journey, change management becomes a critical success factor. However, success heavily depends on the people using the technology. Change management goes beyond acquiring an executive sponsor or providing staff training, it is about changing the mindset of the employees, impacts to their daily routine and how to operationalize it. The promise of rapid deployment and time to value hinge on having a strong change management program in place. How do we can change adopted across all levels of the company?
Todd Putvinxki, VP IT, Siemens