TOLA IT & Security Leaders Forum Agenda

Meet the SINC team, receive all your registration collateral and receive a demonstration on how to best utilize the Forum mobile application during your attendance.

SINC kicks things off and sets the tone for the day with insight in to the various sessions taking place and how to take full advantage of your participation.

The pandemic and the economic fallout that it brought caused many businesses to go bankrupt, unable to adapt to the disruption of shutting down physical operations and interacting with customers and employees digitally. It’s the latest reminder that to survive in today’s economy, organizations must build resilience to withstand the next major market disruption. To thrive, they must create the capabilities that will seize on the opportunities brought by change.

In our Tech Trends Report we’ll explore three trends that help create resilience in the face of disruption:

• Digital sustainability – apply technology towards the goal of achieving cost savings in energy reductions and reduced carbon emissions.
• Machine learning by design – make machine learning a core part of your value proposition.
• Self-sovereign cloud – maintain maximum control over your infrastructure with encryption, data sovereignty compliance, and optimal infrastructure.

We’ll also examine three trends that create a flexible enterprise for the future:

• Distributed autonomous organizations – break away from the work hub model and strengthen your organizational network to create a platform for success.
• Venture architecture – define the capability for continuous reinvention from within.
• Citizen developer 2.0 – make technology solutions outside of the IT department a reality with no-code and low-code tools that take advantage of machine learning.

Speaker: Mike Higginbotham, Executive Counselor, Info-Tech

Presented by: Info-Tech

Diving into the universe of Deception as it pertains to modern day security

Speaker: Mark McKie, Area VP-West, Attivo

Presented by: Attivo Networks

Attivo Networks

 

Self-Learning AI: Redefining Enterprise Security

In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing – and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data and people are protected, wherever they are. Today’s Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours – before the damage is done

In this session, learn how self-learning AI:

  • Detects, investigates and responds to threats – even while you are OOTO 
  • Protects your entire workforce and digital environment – wherever they are, whatever the data
  • Defends against zero-days and other advanced attacks – without disrupting the organization

Speaker: Kathryn Moore, Director, Darktrace

Presented by Darktrace

Darktrace

Choose One Topic Per Session

  1. Managing Up: Board/Directors relationship management 
  2. Ransomware & Securing Your Environment
  3. Cyber Gaps: Every organization is now a technology organization
  4. Business Strategy and the changing role of the CIO
  5. What is your strategy behind the technology or product – why this solution over that one?

With a growing talent crisis, a pandemic slowing and return to office plans accelerating, organizations are expected to face more complex talent challenges. In a hybrid workplace, individuals gain more flexibility on choosing who to work for or where to work from. You will face hiring ‘enough’ or ‘the right talent’, and the approach must continue to evolve while speeding down a runway. Let’s hear from a panel of your peers on how each is preparing for and mitigating People Risk in ways that blend innovation, tenacity, and sustainability for cyber and technology talent acquisition… without the “silly” money. 

Panelists:

Sameer Sait, CISO, Whole Foods Market

Reinier Moquete, Founder & CEO, CyberWarrior Academy

Walter Ferrer, Managing Director and Founder, Zenlity

Whole Foods   

Cyber Resilience: Being Resilient When Cyber Disruption Occurs

Cyber-resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to adapt to customer changes, digital transformation, and hyper-scaled growth.

Learn how to enable cyber resilience within your enterprise to ensure that when the inevitable cyber disruption occurs, stakeholders know that there is a well-thought-out and practiced cyber-resilience plan in place to help ensure the organization can survive and thrive during turbulent times.

We will cover the main goals of being cyber resilient:

  • Anticipating disruptionWithstanding attacks
  • Automation, machine learning, and adaptive cyber-threat detection
  • Recovering rapidly
  • Adapting to an evolving threat landscape

Speaker: Eric Popiel, Chief Security Strategist for CyberRes (A Micro Focus Line of Business), CyberRes

Presented by: CyberRes

CyberRes

Speaker: Sujeet Bambawale, CISO, 7-Eleven

Digital Transformation through Secure Intelligent Automation Empowering a Hybrid Workforce

Speaker: Andy Burns, Solutions Engineer and Technical Evangelist, Blue Prism

Presented by: Blue Prism

Increased Efficiency & Effectiveness Across Your Security Organization with Virtual Mobility Service (VMS)

Why spend time, money and resources protecting hundreds to thousands of devices as a means of protecting your data? Instead – secure the data, not the device. Hypori is a highly secure Streaming Operating System that allows users to access and interact with their most sensitive corporate applications and data without any data ever residing on the device. Hypori make truly secure BYOD a reality with zero data footprint and 100% data separation. 

Speaker: Philip Goodrich, Partners & Alliances Hypori

Presented by: Hypori

Full Cloud Platform for Continuous Global IT, Security, and Compliance Assessment

The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.

Speaker: Shane Kroening, Technical Account Manager, Qualys

Presented by: Qualys

The evolution of ransomware threats and why >20ms is the new prevention benchmark 

  • 1.5 secs: Ransomware begins to spread, infect, and encrypt
  • 3 secs: Malware has control and elevate privileges
  • >1 minute: Average time to detect unknown malware

We will examine the approaches to prevent and detect threats with AI, ML and dive into how Deep Learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more about the chronology of an unknown attack and why a 20ms response time is now the difference between security and a breach.

Speaker: Charles Everette, Cybersecurity Advocate, Deep Instinct

Presented by: Deep Instinct

Are we heading into a post-COVID digital transformation 2.0? The first-gen of digital transformation was driven by investing in customer experiences, becoming data-driven, and migrating to cloud architectures while the organization learned agile, DevOps, and data science capabilities. Digital transformation’s next-gen will be driven by digitally enabled products, hybrid working, proactive data governance, integrated employee experiences, and AI-inside security and operations. Hear from Isaac Sacolick, author of the bestselling Driving Digital and President of StarCIO, on five technologies that are key to digitally transforming the organization.

Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO / CDO, Digital Transformation Influencer

Driving Digital by Isaac Sacolick

While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on?  Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.

Speaker: Christer Swartz, Principal Technical Marketing Engineer Illumio

Presented by Illumio

Illumio

Fuel-up and prepare for a day packed full of content and conversations.

When it comes to the cyber shortage, the need is incredible: an estimated 4 million professionals are needed worldwide. Traditional false perceptions—for example, that cyber is a monolithic career—must be identified and challenged in order to to realign towards developing the talent we need. 
In this critically informative session, Dr. Jason Edwards will share insights from his extensive background in cybersecurity and his 20-year military career, lay out strategies for developing the crucial talent necessary to the current moment and for the future, and lead a dynamic discussion with Q&A.

Speaker: Dr. Jason Edwards, Strategy Principal of Information Security, USAA

Automate Security with Threat Intelligence

As cyber-attacks increase in complexity, frequency, and velocity, in our experience, many enterprise organizations are reliant on outdated IT governance. The organizational paradigm is limited by slow-moving bureaucracy and scarce resources. This situation is often the result of a limited understanding of the risks on the part of decision-makers, like board executives who rely on outdated corporate governance frameworks that were developed in response to accounting scandals – e.g., WorldCom, Enron, Tyco, etc. – not cyber risks.

Enterprise executives continue to propagate a compliance check-box mindset that values minimal security control investment to meet audit standards. The focus on audit/compliance misses the costs that may extend beyond regulatory penalties into financial losses that are not always small enough to recover from without significant repercussions.

In this session, we draw from consulting experience, candid conversations with security leaders, and empirical research to define the current issues plaguing enterprise cyber governance, while offering specific remedies for organizational leaders striving for an effective governance model that moves beyond audit compliance to iterative and measurable risk reduction.

Speaker: Scott Small, Senior Threat Intelligence Consultant, Recorded Future

Presented by: Recorded Future

Securing the Modern API Ecosystem

APIs are central to financial industry transformation. Open banking standards, public cloud adoption and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.

This discussion will highlight strategies for security and risk management of the modern API ecosystem – API discovery and inventory, continuous vulnerability identification and testing, and runtime prevention and detection. Importantly, we will focus on orchestration across business, technology and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

Speaker: Karl Mattson, CISO, Noname Security

Presented by: Noname Security

End of Day

Interested in speaking?
Please submit a request below.