SC Awards 2026

This episode is sponsored by
Full Show Notes
Segment One

SC Awards Winner: Best CTEM Solution – Reach Security – Garrett Hamilton – SCA26 #1

Key Moments
  • 0:00 - Introduction to SC Awards 2026 & Reach Security
  • 0:30 - What is Cyber Exposure (CTE) Explained
  • 01:00 - AI-Powered Threats & Faster Attacks
  • 01:27 - Why Speed Matters in Cybersecurity
  • 01:42 - Why Traditional Security Tools Fall Short
  • 02:10 - The Problem of Misconfigurations & Drift
  • 03:00 - The Operational Gap in Security Controls
  • 03:39 - Automation vs Manual Security Management
  • 04:01 - Customer-Centric Security & Usability
  • 04:30 - Building Trust in Security Automation
  • 05:00 - Scaling Security for Large Enterprises
  • 05:47 - What Makes Reach Security Different
  • 06:02 - Control-Based Security vs CVE Focus
  • 06:30 - Why Misconfigurations Cause Breaches
  • 07:00 - Configuration Drift & Security Risks
  • 07:54 - Context-Driven Security Prioritization
  • 08:29 - Beyond CVEs: Real Risk Prioritization
  • 09:00 - Using Data Lakes for Security Context
  • 09:30 - Example: Phishing-Resistant MFA Risks
  • 10:05 - Understanding Misconfigurations with Context
  • 11:00 - Reducing Noise & Improving Security Decisions
  • 11:21 - Lessons from WAF & Security Deployment
  • 11:46 - How Reach Security Integrates with Existing Tools
  • 12:20 - API-Based Security Architecture Explained
  • 13:00 - The Future: Asset Intelligence & Security
  • 13:30 - Moving Beyond Vulnerability Management
  • 14:00 - Managing Risk Across All Asset Types
  • 14:33 - Connecting Security Data for Better Decisions
  • 15:00 - Final Thoughts on Exposure Management
Guest
CEO and Co-Founder at Reach Security

Garrett Hamilton brings deep expertise in SaaS product management, go-to-market strategy, and cybersecurity leadership. As CEO and Co-Founder of Reach Security, he draws on his experience at industry leaders like Palo Alto Networks, where he guided the WildFire product from launch to over 60,000 customers. With a hands-on background in threat analysis, training, and consulting, Garrett is committed to driving Reach’s mission of transforming how organizations assess and remediate their security posture.

Segment Two

SC Awards Finalist: Security Executive of the Year – Ankur Shah – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026 Interview
  • 0:20 - Meet Striker CEO & Security Executive of the Year
  • 0:47 - Cybersecurity Leadership & Community Impact
  • 01:23 - The AI Shift vs Cloud, Mobile & Internet
  • 01:57 - Rise of Agentic AI in Enterprises
  • 02:25 - Agents Building Agents Explained
  • 02:58 - Citizen Developers & AI Agent Platforms
  • 03:55 - Expanding Attack Surface with AI Agents
  • 04:14 - Why Traditional Security Controls Fail
  • 04:44 - Building AI-Native Security Stacks
  • 05:09 - Using AI to Secure AI (Agent vs Agent)
  • 05:31 - AI as a Force Multiplier for Professionals
  • 06:29 - Future of Work in the AI Era
  • 06:43 - How Leadership Is Changing with AI
  • 07:28 - Flat Organizations & Fewer Middle Managers
  • 07:49 - Industry Uncertainty & Rapid AI Evolution
  • 08:42 - Building with AI: Practical Advice
  • 08:50 - Automating Daily Work with AI Agents
  • 09:30 - Growth Strategy & Scaling Striker
  • 10:44 - Hiring Challenges in the AI Era
  • 11:00 - Advice for Students & AI-Native Talent
  • 11:50 - Securing Agent Ecosystems & Permissions
  • 12:12 - Striker as the AI Security Control Plane
  • 12:53 - Final Thoughts & Closing
Guest
CEO and Co-Founder at Straiker

Ankur Shah is a cybersecurity leader and entrepreneur with a proven track record of building and scaling innovative security solutions. As the Co-Founder and CEO of Straiker, he is focused on revolutionizing AI-driven security technologies. Previously, Ankur served as SVP & GM of Prisma Cloud at Palo Alto Networks, where he grew the cloud security (CNAPP) platform from a single module to an industry-leading Code To Cloud CNAPP Platform. He played a pivotal role in expanding its customer base and increasing revenue by 50x in 5 years. Before that, he led product development at RedLock, CipherCloud, and Symantec, driving advancements in cloud security, DLP, and AI-powered threat detection.

Segment Three

SC Awards Finalist: Best SME Security Solution – Stellar Cyber – Steve Garrison – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026
  • 0:15 - What is Stellar Cyber?
  • 0:35 - Why Outcomes Matter Over Buzzwords
  • 01:10 - Customer Results: Reducing False Positives & Boosting Productivity
  • 01:40 - MSSPs vs Mid-Market: Who Stellar Cyber Serves
  • 02:20 - Scaling Security Operations Without Increasing Cost
  • 02:59 - Building a Unified Security Platform
  • 03:17 - Human-Augmented Autonomous SOC Explained
  • 04:11 - Integrating Tools Like Vulnerability Scanners
  • 05:00 - Open Platform & Multi-Layer AI Approach
  • 05:42 - AI Since 2015: Before It Was Trendy
  • 06:08 - Avoiding Data Overload with Case Management
  • 06:41 - Connecting Alerts into Actionable Cases
  • 08:06 - Visualizing Threats Like a Complete Picture
  • 09:18 - Prioritizing Threats with Case Scoring
  • 10:44 - Using MITRE ATT&CK for Threat Context
  • 11:06 - What’s Next: Agentic AI & Automated Triage
  • 12:10 - Moving from Reactive to Proactive Security
  • 12:50 - Future Vision: Autonomous SOC & AI Defense
  • 13:47 - Scaling Security Teams Without Hiring More
  • 13:58 - Final Thoughts & Key Takeaways
Guest
Senior Vice President of Marketing at Stellar Cyber
Segment Four

SC Awards Finalist: Best Insider Threat Solution – EchoMark – Troy Batterberry – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026
  • 0:15 - What is EchoMark?
  • 0:26 - The Growing Threat of Insider Data Leaks
  • 0:53 - Why Insider Threats Are Increasing (AI & Agents)
  • 01:23 - Who Needs Insider Threat Protection?
  • 02:09 - Introducing Forensic Watermarking Technology
  • 02:30 - Watermarking Text, Images, Video & Source Code
  • 03:22 - Protecting Sensitive Data in the Age of AI
  • 03:50 - Identifying Leak Sources Quickly
  • 04:16 - Preventing Leaks vs Detecting Damage
  • 05:23 - Deterrence: Making Every Copy Traceable
  • 05:43 - Seamless User Experience Without Friction
  • 06:37 - No Client Software: Backend Watermarking Explained
  • 07:34 - Defending Against Malicious & Accidental Leaks
  • 08:34 - Future Roadmap: Expanding Content Protection
  • 09:58 - Screen-Level Watermarking for Enterprises
  • 10:30 - Use Case: Gaming Industry Leak Prevention
  • 11:03 - Scaling Deployment Across Organizations
  • 11:38 - Integration with Microsoft & Google Ecosystems
  • 12:41 - Real-World Use: Insider Threat Detection
  • 13:11 - Protecting Source Code & Intellectual Property
  • 13:54 - Cybersecurity Trends & Rising Insider Risks
  • 15:11 - Final Thoughts on Insider Threat Protection
Guest
CEO & Founder at EchoMark, Inc.

Troy Batterberry is the founder and CEO of EchoMark, a Software-as-a-Service (SaaS) company pioneering a new standard in information protection. The company was founded on that trust is central to empowering everyone to do their best work. Troy brings years of product and technology experience, including 25 years at Microsoft, where he most recently served as a Corporate Vice President as the product leader of Microsoft Teams Meetings, Calling, and
Events. During his tenure, Troy also played an integral role in the growth and success of marquee Microsoft products, such as Windows, Explorer/Edge, Bing, Xbox, and MSN. Before joining Microsoft, Troy held engineering positions at Sony and within the U.S. Department of Defense. Troy is driven by a long-standing passion for creating new experiences and products.

In addition to his professional pursuits, Troy is a parent volunteer at his kids’ schools, spends time volunteering for Boy Scouts, and also enjoys time outdoors boating, hiking, and running. He holds an M.S. in Information Systems from the University of Southern California and a B.S. in Electrical and Electronic Engineering from North Dakota State University.

Segment Five

SC Awards Finalist: Best Threat Detection Technology – Gurucul – Saryu Nayyar – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026
  • 0:15 - What is Gurucul?
  • 0:36 - AI-Powered Threat Detection Explained
  • 01:06 - Securing AI vs Using AI for Security
  • 01:34 - The Growing Threat of AI in Cybersecurity
  • 02:16 - Enterprise vs Mid-Market AI Adoption
  • 02:32 - MSSPs and the Shift to AI MDR
  • 03:42 - Deploying AI SOC Quickly & Efficiently
  • 04:03 - Reducing Costs with AI Data Pipelines
  • 05:00 - AI-Driven Threat Detection & Behavior Analytics
  • 05:40 - AI Analyst: Reducing SOC Workload by 83%
  • 06:05 - Addressing AI Hallucinations & False Positives
  • 06:43 - Auto-Triage & Explainable AI in SOC
  • 07:11 - Eliminating Level 1 Analyst Work
  • 07:47 - Human-Led, AI-Supported SOC Model
  • 08:09 - New Threat Landscape with AI Agents
  • 08:48 - Detecting Shadow AI in Enterprises
  • 09:31 - Behavior Analytics for AI Agents
  • 10:09 - Deploying with Data Lakes & Integrations
  • 10:32 - 700+ Integrations & AI MDR Capabilities
  • 11:02 - Vendor-Agnostic Approach Explained
  • 12:15 - Avoiding Vendor Lock-In with Data Ownership
  • 12:30 - What’s Next: Open AI SOC Platform
  • 12:50 - Building an Army of AI SOC Agents
  • 13:18 - AI CISO & Role-Based AI Assistants
  • 13:31 - Customer Reactions to AI SOC Evolution
  • 14:16 - Final Thoughts & Key Takeaways
Guest
CEO at GuruCul

Saryu Nayyar is an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council. She has more than 15 years of experience in the information security, identity and access management, IT risk and compliance, and security risk management sectors.

She was named EY Entrepreneurial Winning Women in 2017. She has held leadership roles in security products and services strategy at Oracle, Simeio, Sun Microsystems, Vaau (acquired by Sun) and Disney. Saryu also spent several years in senior positions at the technology security and risk management practice of Ernst & Young.

She is passionate about building disruptive technologies and has several patents pending for behavior analytics, anomaly detection and dynamic risk scoring inventions.

Segment Six

SC Awards Finalist: TXOne Networks – Terence Liu – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026 Interview
  • 0:14 - Meet TXOne Networks & OT Security Focus
  • 0:30 - What is OT / ICS Cybersecurity?
  • 0:49 - Challenges Securing Industrial Environments
  • 01:09 - Why OT Environments Are Highly Fragmented
  • 02:07 - One-Size-Does-NOT-Fit-All in OT Security
  • 02:32 - Legacy Systems: Windows XP, DOS & Beyond
  • 03:59 - Biggest Challenge: Supporting Legacy Systems
  • 04:13 - What OT Customers Really Need from Security
  • 05:40 - Balancing Security, Safety & Productivity
  • 06:11 - Introducing Stellar Endpoint Protection
  • 06:35 - Application Whitelisting for OT Systems
  • 07:07 - Why Many Factories Lack Basic Security
  • 07:26 - Preventing Ransomware in Industrial Networks
  • 07:50 - CPSDR: OT Detection & Response Explained
  • 08:33 - Reducing False Positives with Whitelisting
  • 09:40 - Why OT Still Relies on Antivirus Basics
  • 09:58 - Managing Change in Industrial Systems
  • 10:35 - Risks of Updates & Maintenance Windows
  • 11:02 - Deployment Challenges in OT Environments
  • 12:58 - People, Process, Technology in OT Security
  • 13:33 - Designing Simple Yet Effective Security
  • 14:41 - Safe Software Updates & N-1 Strategy
  • 14:52 - Final Thoughts on OT Cybersecurity
Guest
CEO at TXOne Networks

Terence is the CEO of TXOne Networks, a leading provider of cybersecurity solutions for operational technology (OT) and industrial control systems. He is focused on protecting critical infrastructure and ensuring the reliability and safety of industrial environments in an increasingly connected world.

Prior to this role, Terence served as Vice President at Trend Micro, where he led the Network Threat Defense Technology Group and expanded the company’s reach into telecommunications and IoT security. Earlier in his career, he was CEO of Broadweb, where he developed its deep-packet-inspection (DPI) strategy and led the company through its acquisition by Trend Micro in 2013. Terence holds a Ph.D. and M.S. in Computer Science from National Tsing-Hua University and has authored multiple patents and academic publications.

Segment Seven

SC Awards Finalist: Best SASE Solution – Zenarmor – Murat Balaban – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026 Interview
  • 0:15 - Meet Zenarmor & Company Overview
  • 0:27 - Why Modern Organizations Are Distributed
  • 01:00 - The Rise of Remote Work & Micro Branch Offices
  • 01:40 - Limitations of Legacy Network Security (VPN & Appliances)
  • 02:20 - What is SASE & Why It Falls Short
  • 03:10 - The Problem with Centralized Security Architectures
  • 04:05 - Eliminating Latency in Modern Security
  • 04:48 - Deploying Security Directly on Endpoints
  • 05:30 - Single Application Security Architecture Explained
  • 06:10 - Built-in Features: CASB, ZTNA, SWG & Firewall
  • 07:36 - Balancing Security with User Experience
  • 08:02 - Policy Control, Identity & Device Security Posture
  • 09:14 - Easy Deployment Without Changing Infrastructure
  • 10:01 - Replacing Multiple Security Tools with One Solution
  • 11:06 - Why Simplicity is the Future of Cybersecurity
  • 11:45 - Securing AI Agents & Emerging Identity Risks
  • 12:30 - Observability for AI & Human Activity
  • 13:13 - Managing AI Usage in Enterprises
  • 13:40 - What’s Next for ZenArmor
  • 14:19 - Final Thoughts & Closing
Guest
Founder & CEO at Zenarmor

Murat is the founder and CEO of Zenarmor, a company operating in the SASE network security space. With over 20 years of experience, he has dedicated his career to crafting innovative commercial and open source products that resonate with audiences worldwide. He has been in the founding team of several other cyber security startups and non-profit organizations.

A graduate of Bogazici University, Istanbul, Turkey; Murat holds a Bachelor of Science degree in Management Information Systems. His academic foundation, coupled with his entrepreneurial spirit and dedication to technological advancement, continues to drive his success in shaping the future of cybersecurity.

Segment Eight

SC Awards Finalist: Best Insider Threat Solution – Vectra AI – Mark Wojtasiak – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026 Interview
  • 0:16 - Meet Vectra AI & Product Strategy Overview
  • 0:50 - Core Challenge: Who’s On Your Network?
  • 01:20 - Hybrid Enterprise Security (Cloud, OT, IoT)
  • 01:43 - Why Visibility Is Still a Major Problem
  • 02:06 - Security Silos: Cloud, Identity & Endpoint Gaps
  • 03:12 - Achieving Unified Network Observability
  • 03:42 - AI/ML Models for Threat Detection
  • 04:20 - Correlating Threat Events Across Systems
  • 04:59 - Detecting Insider Threats & Privilege Abuse
  • 05:35 - Why the Network Reveals the Truth
  • 06:10 - Continuous Monitoring & Exposure Detection
  • 07:07 - Closing Visibility Gaps in Asset Inventory
  • 07:36 - Identity vs Asset: What Are You Securing?
  • 08:12 - Why Asset Inventory Becomes Obsolete Fast
  • 08:35 - Faster Attacks with AI & Automation
  • 09:15 - Living-Off-the-Land Attacks Explained
  • 09:52 - Thinking Like an Attacker
  • 10:28 - Credential Abuse & Initial Access Risks
  • 11:14 - Future Roadmap & Continuous AI Detection Updates
  • 12:00 - Observing AI Agents & Shadow AI Risks
  • 12:36 - Policy Violations & Accidental Insider Threats
  • 13:20 - Reducing SOC Noise with Entity-Based Detection
  • 14:03 - Final Thoughts & Where to Learn More
Guest
SVP of Product Research and Strategy at Vectra AI

Mark, also known as Woj, is the Vice President of Product Research and Strategy at Vectra AI. Passionate about cybersecurity and dedicated to simplifying the complex, Woj consistently advocates for cyber defenders in his approach to product development, marketing, and leadership. He focuses on translating real-world attacker behavior into practical innovations to help security teams detect, investigate, and stop threats faster and with greater confidence.

With deep insight into the evolving threat landscape, Woj works at the intersection of research and product strategy to ensure Vectra AI’s solutions address the real challenges security teams face every day. He is particularly focused on identity-driven attacks, AI-enabled threats, and hybrid cloud risk, and is known for turning technical complexity into clear, actionable strategy for customers and industry peers alike.

Segment Nine

SC Awards Finalist: Best Identity Management Solution – Teleport – Diana Jovin – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026 Interview
  • 0:16 - Meet Teleport & Identity Security Overview
  • 0:26 - The Problem: Fragmented Identity & Secrets
  • 0:56 - AI Risks in Poorly Secured Environments
  • 01:17 - Unifying Human, Machine & AI Identities
  • 01:56 - Eliminating Passwords & Standing Privileges
  • 02:35 - Cryptographic Identity vs Traditional Authentication
  • 03:20 - Simplifying Compliance & Audit Processes
  • 03:57 - Reducing Attack Surface by Removing Secrets
  • 04:25 - Improving Developer Experience with Security
  • 05:03 - Why Usability Drives Security Adoption
  • 05:36 - Managing Agentic AI Identities
  • 06:10 - Why AI Agents Must Be First-Class Identities
  • 06:36 - Controlling Non-Deterministic AI Behavior
  • 07:25 - Over-Privileged Agents & Security Risks
  • 07:50 - Preventing Prompt Injection & Data Exposure
  • 08:27 - Fast Deployment Without Disrupting Systems
  • 09:11 - Integrating with Existing Identity Providers
  • 09:46 - Governance, Compliance & Privileged Access
  • 10:46 - Shadow AI & Hidden Enterprise Risks
  • 11:10 - Future of AI Identity Security & Roadmap
  • 12:30 - Policy-Driven Identity & Access Control
  • 13:04 - Maintaining Security at Scale with AI Growth
  • 13:39 - Final Thoughts & Closing
Guest
Chief Marketing Officer at Teleport

Diana Jovin is CMO at Teleport. With over 30 years of experience, she brings deep expertise in marketing and business development leadership for B2B technology companies. A strategic and analytical thinker, Diana excels at defining corporate and product positioning, building thought leadership platforms, empowering global sales organizations, and executing go-to-market strategies that drive business growth.

At Teleport, Diana is a driving force in articulating and championing the company’s vision for Infrastructure Identity and its critical role in enabling trusted computing.

Segment Ten

SC Awards Finalist: Best Enterprise Security Solution – Island – Michael Leland – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026
  • 0:15 - Introduction to Island Enterprise Browser
  • 0:29 - Why Consumer Browsers Are a Security Risk
  • 0:52 - Building a Secure Enterprise Browser
  • 01:20 - Enterprise Trust, Identity & Policy Control
  • 01:52 - Application Data Boundary Explained
  • 02:20 - Extending Security Beyond the Browser
  • 02:44 - AI Shift from Cloud to Desktop Risks
  • 03:12 - Understanding AI User Intent & Local Threats
  • 03:33 - Browser Hardening & Attack Surface Reduction
  • 04:11 - Protection Against Zero-Day Vulnerabilities
  • 04:43 - Risks of AI Browsers Built on Chromium
  • 05:10 - Controlling AI Access with Policy Guardrails
  • 05:33 - Managing Shadow AI & Application Sprawl
  • 06:11 - Dangerous AI Extensions & Supply Chain Risks
  • 07:11 - Preventing Data Leaks in AI Tools
  • 07:52 - Handling Personal vs Corporate AI Usage
  • 08:30 - Secure Use of Extensions like Grammarly
  • 09:22 - Balancing Security with User Experience
  • 10:03 - Improving Admin & End-User UX
  • 10:32 - Reducing Complexity Across Security Tools
  • 11:03 - Dynamic Policy & Context-Aware Security
  • 12:13 - Real-Time Data Protection Without User Action
  • 12:53 - Customer-Driven Innovation & Features
  • 13:40 - Digital Experience Monitoring & Performance
  • 14:40 - Remote Support & System Observability
  • 15:36 - Rapid Innovation & Feature Development
  • 15:48 - Final Thoughts & Where to Learn More
Guest
VP and Field CTO at Island

Michael is Field CTO at Island, bringing over 30 years of data networking, operations, and cybersecurity domain expertise. He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap as well as the identity security portfolio. Prior to SentinelOne, he held the title of Chief Technical Strategist for McAfee. Michael was the co-founder and CTO of NitroSecurity – later acquired by McAfee – where he was responsible for developing and implementing their overall SIEM technology vision and roadmap and has held senior technical management positions at Cabletron and Avaya.

Segment Eleven

SC Awards Finalist: Best Application Security Solution – RoonCyber – Gene Fay – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026 Interview
  • 0:14 - Introducing Rune Cyber & Runtime CNAPP
  • 0:25 - What is Runtime CNAPP & Why It Matters
  • 01:04 - AI, LLMs & Agent Security Concerns
  • 01:19 - Managing AI Agent Lifecycle & Ownership
  • 02:25 - The Importance of Runtime Visibility
  • 02:50 - eBPF Sensors for Frictionless Security
  • 03:58 - Benefits of eBPF vs Traditional Agents
  • 04:16 - Improving CISO & Engineering Collaboration
  • 04:43 - Reducing Vulnerability Noise with Runtime Data
  • 05:21 - Prioritizing Exploitable Vulnerabilities
  • 05:43 - AI Accelerating Development & Security Risks
  • 06:31 - “Eating Your Own Dog Food” in Security
  • 07:33 - Mid-Market Security Challenges Explained
  • 08:00 - AI Uncertainty & Security Strategy Gaps
  • 09:14 - Shadow AI & Governance Challenges
  • 10:13 - Real-World AI Data Leakage Risks
  • 10:59 - Expanding Security Beyond Code to AI Use Cases
  • 11:19 - Shift Left vs Runtime Security Debate
  • 12:19 - Aligning Security & Engineering Incentives
  • 13:24 - Future Roadmap: AI Workload Security
  • 13:47 - Final Thoughts & Closing
Guest
CEO at RoonCyber

Gene has a lengthy track record as an executive at technology companies, including COO at White Ops, General Manager at Resilient Systems (acquired by IBM), and VP of Worldwide Sales and Global Alliances of Network Intelligence (acquired by EMC and integrated into RSA). Gene has extensive experience building high-impact teams at early-stage startups in storage, virtualization, and cybersecurity. He has specific expertise in go-to-market strategies, marketing, customer success, and channel development. Gene holds an MBA from Northeastern University, where he guest lectures on topics such as product management, marketing, and sales

Segment Twelve

SC Awards Finalist: Best Professional Certification Program – ISACA – Mary Carmichael – SCA26 #1

Key Moments
  • 0:00 - Welcome to SC Awards 2026
  • 0:15 - Introduction to ISACA & Global Community
  • 0:35 - ISACA Certifications: CISA, Risk, Security & AI
  • 01:10 - The Evolution of IT Auditing to AI Systems
  • 01:46 - Why Cybersecurity Requires Diverse Expertise
  • 02:25 - AI in Business: Trust, Risk & Third-Party Systems
  • 03:05 - Evaluating AI Risk & Vendor Trust (SOC 2, Controls)
  • 03:42 - AI Use Cases: Chatbots, Automation & Decision Systems
  • 04:28 - Building Trust in AI Through Context & Controls
  • 05:20 - AI vs Traditional Automation Explained
  • 06:00 - Digital Transformation Lessons for AI Adoption
  • 06:45 - Workforce Impact & New AI Roles
  • 07:01 - Do You Really Need AI? ROI & Cost Considerations
  • 07:43 - AI Implementation Challenges & Operating Models
  • 08:48 - Human Accountability in AI Systems
  • 09:03 - ISACA Chapters, Mentorship & Networking Benefits
  • 10:04 - Community Collaboration & Industry Partnerships
  • 10:55 - Cybersecurity Bootcamps & Career Pathways
  • 11:58 - Transitioning Into Cybersecurity Careers
  • 12:34 - Importance of Information Sharing in Security
  • 12:47 - New AI Risk Management Certification (Preview)
  • 13:33 - Risk Frameworks, OWASP & AI Security Controls
  • 14:06 - Managing Prompt Injection & AI Threats
  • 14:53 - Business Value vs Risk in AI Adoption
  • 15:01 - Why You Should Embrace AI (Not Avoid It)
  • 15:18 - Final Thoughts: Join the Cybersecurity Community
Guest
Principal Director, Strategy, Risk & Delivery at Momentum Technology; Board Member, ISACA Vancouver at ISACA

Mary Carmichael is the Managing Director of Risk Advisory at Momentum Technology, with over 15 years of experience in technology risk management. Her expertise spans multiple sectors, including higher education, government, and energy, with a strong focus on third-party risk management, including vendor assessment and due diligence activities for systems procurement. Mary is a Member of the ISACA Global CRISC Committee and the Emerging Trends Working Group, where she offers insights on AI’s implications for governance, risk, and compliance functions. A published author and global speaker, Mary also serves as President of ISACA’s Vancouver Canada Chapter and is a speaker on the transformative effects of emerging technologies on business operations.

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds