About Our Sponsors
Snyk.io is a developer-focused security platform designed to find, prioritize, and fix vulnerabilities in code, open-source dependencies, containers, and infrastructure as code (IaC). It enables DevSecOps by integrating directly into development workflows (IDE, Git, CLI), offering actionable remediation advice. Snyk helps teams build secure software faster by reducing noise and focusing on high-risk issues
Join us for a panel on securing AI native development, reducing application risk, governing AI generated code, and enabling faster, safer innovation across modern software teams everywhere
Speakers
Matt Bartley — GTM AI Security, Snyk
Agenda
11:30 AM — Networking & Check-In
12:00 PM — Program Begins
12:50 PM — Q&A
1:00 PM — Wrap-Up
Speaker
Matt Bartley
GTM AI Security, Snyk
NTX ISSA Members
When registering put your ISSA Membership # in the “Promo Code” to see the Member ticket option..
Please ensure you have no trailing spaces after you enter your Member #.
Get ready for a fast-paced, interactive Lunch & Learn featuring live cybersecurity debates. Experts will go head-to-head on three timely topics, presenting arguments, rebuttals, and real-world perspectives. After each round, the audience will weigh in, vote on the winner, and engage in open Q&A to dive deeper into the discussion.
Debate Topics:
AI: Security Enabler or Security Nightmare?
Can third party risk be managed? Yes or no
Is identity truly the new perimeter or is that overstated?
Moderator
Dustin "Wirefall" Dykes
Entrepreneur & Founder of Telesploit
Speaker
Jonalea Gaalema
CISSP, CISA & AAISM
Speaker
Brendon McCaulley
CISO at Connexpay, President at NTX ISSA
Speaker
Edsel Garcia Mendez-Budar
Information Security Director, PepsiCo
Speaker
Andy “Rainmaker” Thompson
Sr. Offensive Cybersecurity Research Evangelist, CyberArk Labs, Palo Alto
Speaker
Jacen Kohler
Sr Manager Risk Management Consultant
About Our Sponsors
Conifers.ai is transforming security operations centers (SOCs) with our CognitiveSOC™ AI SOC platform, enabling enterprises and MSSPs to achieve SOC excellence. By leveraging agentic AI and an organization's own institutional knowledge, we help security teams investigate complex, multi-tier incidents with transparency, speed, accuracy, and trust.
Intezer is a Forensic AI SOC for Enterprises. Intezer’s AI SOC delivers measurable security results, not just productivity gains. By combining AI agents with a proprietary forensic toolset that includes endpoint analysis, memory scanning, file reverse engineering, and threat intelligence, Intezer provides fast, consistent, and accurate alert triage. This hybrid approach reduces heavy AI processing and achieves median triage times under one minute with predictable cost.
NTX ISSA Members
When registering put your ISSA Membership # in the “Promo Code” to see the Member ticket option..
Please ensure you have no trailing spaces after you enter your Member #.
Traditional incident response restores systems but often leaves the real problem untouched. Modern IFIR must reconstruct what happened, close the identity gaps attackers exploited, and harden Tier 0 to prevent re-entry. Learn what identity-centric IR looks like and how to demand more than “we restored from backup.”
Moderator
Larci Robertson
Cyber Threat Intelligence Leader & Navy Veteran
Panelist
Tim Beasley
Sr. Incident Response Consultant, Semperis
Panelist
Tom Simerson
Field Technical Director, Cohesity
Panelist
Subbarao Saladi
Field Technical Director, Cohesity
NTX ISSA Members
When registering put your ISSA Membership # in the “Promo Code” to see the Member ticket option..
Please ensure you have no trailing spaces after you enter your Member #.
Your security stack is only effective if controls are deployed correctly, configured as intended, and still working as your environment changes. In practice, misconfigurations, underused features, and configuration drift quietly increase exposure, often without triggering alerts or showing up in dashboards.
In this session, Garrett Hamilton, CEO & Co-founder of Reach Security, will walk through how security teams can continuously validate the controls they already own, identify attacker-reachable exposures across identity, endpoint, email, and network layers, and prioritize the specific configuration changes that actually reduce real-world risk. Drawing on real customer examples, he’ll show how teams move beyond one-time assessments and reactive hardening toward ongoing assurance that controls remain aligned with their defensive strategy.
Attendees will learn how to reduce exposure without adding more tools or headcount, gain confidence that security controls are working as intended, and provide defensible, evidence-based assurance to leadership, while cutting through noise and focusing effort where it matters most.
Moderator
Robert Pace
Vice President Information Security CISO
Panelist
Tim Luck
Director of Business Development, Maple Networks
Panelist
Sanny Liao
Co-founder and Chief Product Officer
Panelist
Eric Bowerman
AVP Cybersecurity & Technology Services