West IT & Security Leaders Agenda

Meet the SINC team, receive all your registration collateral and receive a demonstration on how to best utilize the Forum mobile application during your attendance.

SINC kicks things off and sets the tone for the day with insight in to the various sessions taking place and how to take full advantage of your participation.

As businesses adopt more flexible, hybrid workplaces, one thing is becoming clear: digital employee experience matters now more than ever.

But although 90% of C-level execs agree DEX has become more important since the pandemic — and 67% of IT leaders say it’s a critical priority — only 7% of employees are completely satisfied with their digital experiences.

So why is there a divide?

We’ll take an inside look our recent report, The Future of the Digital Workplace, to uncover:

  • The priority DEX is given within different organizations across the globe
  • Divides among C-level, IT leaders, and employees about digital employee experience
  • The impact DEX can have on productivity and business outcomes
  • How and where technology can play a key role in improving DEX

Speaker: Jason Coari, Senior Director Product Marketing, Lakeside Software

Presented by: Lakeside Software

Diving into the universe of Deception as it pertains to modern day security.

Speaker: Mark McKie, Area VP-West, Attivo

Presented by: Attivo Networks

Attivo Networks

Cyber Resilience: Being Resilient When Cyber Disruption Occurs

Cyber-resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to adapt to customer changes, digital transformation, and hyper-scaled growth.

Learn how to enable cyber resilience within your enterprise to ensure that when the inevitable cyber disruption occurs, stakeholders know that there is a well-thought-out and practiced cyber-resilience plan in place to help ensure the organization can survive and thrive during turbulent times.

We will cover the main goals of being cyber resilient:

  • Anticipating disruption
  • Withstanding attacks
  • Automation, machine learning, and adaptive cyber-threat detection
  • Recovering rapidly
  • Adapting to an evolving threat landscape

Speaker: Eric Popiel, Chief Security Strategist for CyberRes (A Micro Focus Line of Business), CyberRes

Presented by: CyberRes

CyberRes

Crawl, Walk, Run Your Segmentation Strategy

While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar. Another thing everyone can agree on? Segmentation is hard. This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.

Speaker: Christer Swartz, Principal Technical Marketing Engineer, Illumio

Presented by: Illumio

Illumio

Our technology is vulnerable but the solution is not more technology. Security is all about the people, process, and technology. In this session we will discuss how understanding and emulating attacks in your organization can help improve, and hopefully prevent, the next attack as you train and improve your people, process, and technology.

Speaker: Bryson Bort, Founder of SCYTHE and Faculty at IANS

Choose One Topic Per Session

  1. Managing Up: Board/Directors relationship management (Moderator: Scot McCombs , Director of Information Technology, Canyons School District) 
  2. Ransomware & Securing Your Environment (Robert Pace, Vice President Information Security, CISO, Invitation Homes)
  3. Cyber Gaps: Every organization is now a technology organization 
  4. Business Strategy and the changing role of the CIO (Moderator: Saby Waraich, CIO, Clackamas Community College)
  5. What’s your strategy behind the tech or product – why this solution over that one? (Moderator: Sameer Sait, Previous CISO Whole Foods)

The Evolution of Ransomware Threats: Why >20ms is the New Prevention Benchmark

  • 1.5 secs: Ransomware begins to spread, infect, and encrypt
  • 3 secs: Malware has control and elevate privileges
  • >1 minute: Average time to detect unknown malware

We will examine the approaches to prevent and detect threats with AI, ML and dive into how Deep Learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more about the chronology of an unknown attack and why a 20ms response time is now the difference between security and a breach.

Speaker: Ryan Health, Sales Engineer, Deep Instinct

Presented by: Deep Instinct

Universal Strategies: If The Bad Guys Are Automating – Then So Should You

Automation is a powerful asset to any company — unfortunately, automation is also a powerful tool that cybercriminals leverage to attack their targets. Threat actors can use it to control the distribution and communication of malware, provide commands, and initiate future phases of an attack. They have a strategy – so you should too.

During our time, Levi Gundert, VP of Global Intelligence will present a threat briefing on current trends across several industries as well as share perspective on threat intelligence and automation; how even the smallest of organizations can take strategic steps to get more out of their existing security posture and stay one step ahead of the adversary. The session will challenge assumptions and discuss what is a “successful” strategy when it comes to implementing threat intelligence and what true “actionable” intelligence is.

Speaker: Levi Gundert, Senior Vice President of Global Intelligence and Customer Success, Recorded Future

Presented by: Recorded Future

This session will focus on lessons learned in developing a DevSecOps program. Specifically practical actionable pointers on how to approach the program, including what not to do. The essential agenda items include ’Crossing the chasm: Components for success” and “DevSecOps Guiding Framework.

Speaker: Les Correia, Executive Director-Global Head of Application Security, Estée Lauder

The concept of “leading from the front” is generally accepted as the leadership perspective and has fit into most classic linear organizations with the generations that worked at one organization until they retired. The concept of leading from beside ascribes to the servant leadership model where you set direction, provide support, and most importantly take a genuine interest in what keeps team members engaged and learn their long term goals are. As a partner/leader you have to then work to shed yourself of tunnel vision and ask the question how can you assist them with getting there and commit to finding a way to mutually benefit. Investment in your team yields a higher degree of job satisfaction, company loyalty, and trust in your leadership.

Speaker: Al Gardner, Vice President of Information Technology and Security, Inspirato

Stopping Ransomware with Autonomous Response

New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.  

Join Brianna Leddy, Darktrace’s Director and Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

This presentation will discuss: 

  • Recent ransomware threat trends, including double extortion and RDP attacks
  • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   
  • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day 

Speaker: Brianna Leddy, Director of Analysis, Darktrace

Presented by: Darktrace

Darktrace

Ransom-proof: Ransomware and Cyber-threat Protection for 2022

In 2021 we’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency. Join this session to learn about:

  • Recent trends for protecting your organization from malicious attacks
  • Best practices to put your data in a better position mitigate and remediate against ransomware
  • Lessons learned from actual ransomware attacks
  • And more!

Speaker: Jeff Reichard, Senior Director of Enterprise Strategy, Veeam

Presented by: Veeam

Veeam

Are we heading into a post-COVID digital transformation 2.0? The first-gen of digital transformation was driven by investing in customer experiences, becoming data-driven, and migrating to cloud architectures while the organization learned agile, DevOps, and data science capabilities. Digital transformation’s next-gen will be driven by digitally enabled products, hybrid working, proactive data governance, integrated employee experiences, and AI-inside security and operations. Hear from Isaac Sacolick, author of the bestselling Driving Digital and President of StarCIO, on five technologies that are key to digitally transforming the organization.

Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO / CDO, Digital Transformation Influencer

Driving Digital by Isaac Sacolick

Full Cloud Platform for Continuous Global IT, Security, and Compliance Assessment

The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.

Speaker: Peter Liu, Technical Account Manager, Pre-Sales, Qualys

Presented by: Qualys

We hear a lot of acronyms in our world – typically it’s the hot new, shiny thing in security – but what is our industry doing to help guide you through the process of detecting, investigating, and responding to active threats? “Set it and forget it” isn’t good enough – but guiding you through the process, procedures, and scenarios to enable success should be a priority as well. In this sessions you will learn more about the following

  1. Guided-SaaS NDR– a journey from the core to the cloud – with help, not just software and a subscription.
  2. Acronym Soup and why no one seems to agree on what these new solution sets really mean (XDR, etc)
  3. Why are people investing in solutions that come with product AND people – together?
  4. How Gigamon makes other solutions better – API for an eye.
  5. Best Security Memes will win a prize.

Speaker: Ian Shiff, Director, Security Strategy and Sales, Gigamon

Presented by: Gigamon

 

Congratulations on your new job—you’re the Security Operations Center Manager at The Unicorn Company, Inc! In the vein of old school Choose Your Own Adventure stories, this is a custom created Blue Team adventure that leads the audience through an incident response including technical and business considerations. The audience votes through a live poll on decision points in the story including detection, identification, response, remediation, and threat hunting.

Speaker: Bryson Bort, Founder of SCYTHE and Faculty at IANS

With a growing talent crisis, a pandemic slowing and return to office plans accelerating, organizations are expected to face more complex talent challenges. In a hybrid workplace, individuals gain more flexibility on choosing who to work for or where to work from. You will face hiring ‘enough’ or ‘the right talent’, and the approach must continue to evolve while speeding down a runway. Let’s hear from a panel of your peers on how each is preparing for and mitigating People Risk in ways that blend innovation, tenacity, and sustainability for cyber and technology talent acquisition… without the “silly” money. 

Panelists:

Shivani Agarwal, Head of IT, McLane Company

Reiner Moquete, Founder & CEO, CyberWarrior Academy

Walter Ferrer, Managing Director and Founder, Zenlity

Terry Williams Director of IT Operations, HealthPoint

The Revolution in Mobile Security – A Zero-Trust Architecture Approach to Securing All Corporate Data via Mobile Devices

Hypori offers a more secure and simplified solution than legacy MDM delivering a separate, 100% private, corporate workspace to any mobile device. Our cloud-based, zero-trust architecture, enables remote access to enterprise apps from any device, anywhere. Hypori guarantees no data at rest on the device, eliminating security and privacy risks, and Hypori’s SaaS delivery accelerates deployment and scales on-demand.

Speaker: Darren Bayless, Director of Commercial Sales, Hypori

Presented by: Hypori

WHY: Protection is good, but it’s not enough. You will be breached and the question is: will you detect it and are you ready to respond?
HOW: By reducing the complexity and consolidating the technology, you will be able to detect threats and respond quickly
WHAT: Open Systems MDR Service, built around the Microsoft Security Stack, offers best practices for lean, effective, and standardized security operations

Speaker: David Appleman, Senior Sales Executive, Open Systems

Presented by: Open Systems

Your security team manages risks that affect business units and functions across your entire organization. Security is threaded through every aspect of your business, and your decisions have never mattered more. On a daily basis, you make decisions that affect day-to-day operations, data and system security, executive-level strategy and direction and quite possibly, the future success of your organization. Security leaders straddle the lines of executive, strategic, and tactical decision making, and must be experts at navigating all three of these levels. We’re wearing many hats, often switching between them from meeting to meeting, and it’s imperative that we can effectively communicate and drive decisions that improve and mature our security efforts across the board.

This session will explore ways to enhance engagement with technical teams, business units and executives alike, while still maturing your security program to be more efficient and effective at managing and mitigating risk. Concepts and topics covered will include:

  • The 3 levels of decision making you must navigate on a daily basis and how they impact the rest of the organization
  • Applying meaningful metrics to demonstrate value to executives and mature program operations for optimal effectiveness
  • Finding program gaps where remediation efforts or SLA compliance is lagging, and taking steps to help affected teams improve and succeed
  • How Tenable helps to improve operational efficiency, address threats and vulnerabilities faster, and demonstrate tangible business value at all levels of the organization

Speaker: Nathan Wenzler, Chief Security Strategist, Tenable

In this experience report, Niel Nickolaisen will talk about the specific and pragmatic things IT leaders and organizations can do to improve delivery, get better at decision-making, reduce waste and become agile and adaptive. You will leave this session with a set of tools you can use to lead your organization’s transformation.

To use the dreaded, overused buzz words, all of us are in midst of some type of digital transformation. Technology defines the organization’s future. This implies a big change for our IT organizations – if in the past we were a support organization we are now a lead and guide organization. This change in role requires that we achieve excellent in a number of areas.

Fortunately, we can achieve excellence at no cost – yes, for free!

Speaker: Niel Nickolaisen, CIO, Sorenson Communications

End of Day

Interested in speaking?
Please submit a request below.