Meet the SINC team, receive all your registration collateral and receive a demonstration on how to best utilize the Forum mobile application during your attendance.
SINC kicks things off and sets the tone for the day with insight in to the various sessions taking place and how to take full advantage of your participation.
As businesses adopt more flexible, hybrid workplaces, one thing is becoming clear: digital employee experience matters now more than ever.
But although 90% of C-level execs agree DEX has become more important since the pandemic — and 67% of IT leaders say it’s a critical priority — only 7% of employees are completely satisfied with their digital experiences.
So why is there a divide?
We’ll take an inside look our recent report, The Future of the Digital Workplace, to uncover:
Speaker: Jason Coari, Senior Director Product Marketing, Lakeside Software
Presented by: Lakeside Software
Diving into the universe of Deception as it pertains to modern day security.
Speaker: Mark McKie, Area VP-West, Attivo
Presented by: Attivo Networks
Cyber-resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to adapt to customer changes, digital transformation, and hyper-scaled growth.
Learn how to enable cyber resilience within your enterprise to ensure that when the inevitable cyber disruption occurs, stakeholders know that there is a well-thought-out and practiced cyber-resilience plan in place to help ensure the organization can survive and thrive during turbulent times.
We will cover the main goals of being cyber resilient:
Speaker: Eric Popiel, Chief Security Strategist for CyberRes (A Micro Focus Line of Business), CyberRes
Presented by: CyberRes
While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar. Another thing everyone can agree on? Segmentation is hard. This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.
Speaker: Christer Swartz, Principal Technical Marketing Engineer, Illumio
Presented by: Illumio
Our technology is vulnerable but the solution is not more technology. Security is all about the people, process, and technology. In this session we will discuss how understanding and emulating attacks in your organization can help improve, and hopefully prevent, the next attack as you train and improve your people, process, and technology.
Speaker: Bryson Bort, Founder of SCYTHE and Faculty at IANS
Choose One Topic Per Session
We will examine the approaches to prevent and detect threats with AI, ML and dive into how Deep Learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more about the chronology of an unknown attack and why a 20ms response time is now the difference between security and a breach.
Speaker: Ryan Health, Sales Engineer, Deep Instinct
Presented by: Deep Instinct
Automation is a powerful asset to any company — unfortunately, automation is also a powerful tool that cybercriminals leverage to attack their targets. Threat actors can use it to control the distribution and communication of malware, provide commands, and initiate future phases of an attack. They have a strategy – so you should too.
During our time, Levi Gundert, VP of Global Intelligence will present a threat briefing on current trends across several industries as well as share perspective on threat intelligence and automation; how even the smallest of organizations can take strategic steps to get more out of their existing security posture and stay one step ahead of the adversary. The session will challenge assumptions and discuss what is a “successful” strategy when it comes to implementing threat intelligence and what true “actionable” intelligence is.
Speaker: Levi Gundert, Senior Vice President of Global Intelligence and Customer Success, Recorded Future
Presented by: Recorded Future
This session will focus on lessons learned in developing a DevSecOps program. Specifically practical actionable pointers on how to approach the program, including what not to do. The essential agenda items include ’Crossing the chasm: Components for success” and “DevSecOps Guiding Framework.
Speaker: Les Correia, Executive Director-Global Head of Application Security, Estée Lauder
The concept of “leading from the front” is generally accepted as the leadership perspective and has fit into most classic linear organizations with the generations that worked at one organization until they retired. The concept of leading from beside ascribes to the servant leadership model where you set direction, provide support, and most importantly take a genuine interest in what keeps team members engaged and learn their long term goals are. As a partner/leader you have to then work to shed yourself of tunnel vision and ask the question how can you assist them with getting there and commit to finding a way to mutually benefit. Investment in your team yields a higher degree of job satisfaction, company loyalty, and trust in your leadership.
Speaker: Al Gardner, Vice President of Information Technology and Security, Inspirato
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Brianna Leddy, Darktrace’s Director and Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
Speaker: Brianna Leddy, Director of Analysis, Darktrace
Presented by: Darktrace
In 2021 we’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency. Join this session to learn about:
Speaker: Jeff Reichard, Senior Director of Enterprise Strategy, Veeam
Presented by: Veeam
Are we heading into a post-COVID digital transformation 2.0? The first-gen of digital transformation was driven by investing in customer experiences, becoming data-driven, and migrating to cloud architectures while the organization learned agile, DevOps, and data science capabilities. Digital transformation’s next-gen will be driven by digitally enabled products, hybrid working, proactive data governance, integrated employee experiences, and AI-inside security and operations. Hear from Isaac Sacolick, author of the bestselling Driving Digital and President of StarCIO, on five technologies that are key to digitally transforming the organization.
Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO / CDO, Digital Transformation Influencer
The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.
Speaker: Peter Liu, Technical Account Manager, Pre-Sales, Qualys
Presented by: Qualys
We hear a lot of acronyms in our world – typically it’s the hot new, shiny thing in security – but what is our industry doing to help guide you through the process of detecting, investigating, and responding to active threats? “Set it and forget it” isn’t good enough – but guiding you through the process, procedures, and scenarios to enable success should be a priority as well. In this sessions you will learn more about the following
Speaker: Ian Shiff, Director, Security Strategy and Sales, Gigamon
Presented by: Gigamon
Congratulations on your new job—you’re the Security Operations Center Manager at The Unicorn Company, Inc! In the vein of old school Choose Your Own Adventure stories, this is a custom created Blue Team adventure that leads the audience through an incident response including technical and business considerations. The audience votes through a live poll on decision points in the story including detection, identification, response, remediation, and threat hunting.
Speaker: Bryson Bort, Founder of SCYTHE and Faculty at IANS
With a growing talent crisis, a pandemic slowing and return to office plans accelerating, organizations are expected to face more complex talent challenges. In a hybrid workplace, individuals gain more flexibility on choosing who to work for or where to work from. You will face hiring ‘enough’ or ‘the right talent’, and the approach must continue to evolve while speeding down a runway. Let’s hear from a panel of your peers on how each is preparing for and mitigating People Risk in ways that blend innovation, tenacity, and sustainability for cyber and technology talent acquisition… without the “silly” money.
Shivani Agarwal, Head of IT, McLane Company
Reiner Moquete, Founder & CEO, CyberWarrior Academy
Walter Ferrer, Managing Director and Founder, Zenlity
Terry Williams Director of IT Operations, HealthPoint
Hypori offers a more secure and simplified solution than legacy MDM delivering a separate, 100% private, corporate workspace to any mobile device. Our cloud-based, zero-trust architecture, enables remote access to enterprise apps from any device, anywhere. Hypori guarantees no data at rest on the device, eliminating security and privacy risks, and Hypori’s SaaS delivery accelerates deployment and scales on-demand.
Speaker: Darren Bayless, Director of Commercial Sales, Hypori
Presented by: Hypori
WHY: Protection is good, but it’s not enough. You will be breached and the question is: will you detect it and are you ready to respond?
HOW: By reducing the complexity and consolidating the technology, you will be able to detect threats and respond quickly
WHAT: Open Systems MDR Service, built around the Microsoft Security Stack, offers best practices for lean, effective, and standardized security operations
Speaker: David Appleman, Senior Sales Executive, Open Systems
Presented by: Open Systems
Your security team manages risks that affect business units and functions across your entire organization. Security is threaded through every aspect of your business, and your decisions have never mattered more. On a daily basis, you make decisions that affect day-to-day operations, data and system security, executive-level strategy and direction and quite possibly, the future success of your organization. Security leaders straddle the lines of executive, strategic, and tactical decision making, and must be experts at navigating all three of these levels. We’re wearing many hats, often switching between them from meeting to meeting, and it’s imperative that we can effectively communicate and drive decisions that improve and mature our security efforts across the board.
This session will explore ways to enhance engagement with technical teams, business units and executives alike, while still maturing your security program to be more efficient and effective at managing and mitigating risk. Concepts and topics covered will include:
Speaker: Nathan Wenzler, Chief Security Strategist, Tenable
In this experience report, Niel Nickolaisen will talk about the specific and pragmatic things IT leaders and organizations can do to improve delivery, get better at decision-making, reduce waste and become agile and adaptive. You will leave this session with a set of tools you can use to lead your organization’s transformation.
To use the dreaded, overused buzz words, all of us are in midst of some type of digital transformation. Technology defines the organization’s future. This implies a big change for our IT organizations – if in the past we were a support organization we are now a lead and guide organization. This change in role requires that we achieve excellent in a number of areas.
Fortunately, we can achieve excellence at no cost – yes, for free!
Speaker: Niel Nickolaisen, CIO, Sorenson Communications
End of Day