SC Awards Winner: Best CTEM Solution – Reach Security – Garrett Hamilton – SCA26 #1
At RSAC 2026, Mike Shema speaks with Garrett Hamilton of Reach Security, winner of Best Continuous Threat Exposure Management (CTEM) Solution in the SC Awards Trust category. He shares how Reach is helping organizations continuously identify and reduce real-world risk.
The SC Awards recognize cybersecurity innovation, impact, and effectiveness, as judged by industry practitioners.
Segment Resources:
Website: reach.security
Video - Stop Configuration Drift - https://www.youtube.com/watch?v=4ce4btSIiaw
Security Controls Optimization: https://www.reach.security/security-controls-optimization
Blog - A Comprehensive Guide to CTEM https://www.reach.security/blog/a-comprehensive-guide-to-continuous-threat-exposure-management-ctem
This segment is sponsored by Reach Security. Visit https://securityweekly.com/reachrsac to learn more about them!
- - Introduction to SC Awards 2026 & Reach Security
- - What is Cyber Exposure (CTE) Explained
- - AI-Powered Threats & Faster Attacks
- - Why Speed Matters in Cybersecurity
- - Why Traditional Security Tools Fall Short
- - The Problem of Misconfigurations & Drift
- - The Operational Gap in Security Controls
- - Automation vs Manual Security Management
- - Customer-Centric Security & Usability
- - Building Trust in Security Automation
- - Scaling Security for Large Enterprises
- - What Makes Reach Security Different
- - Control-Based Security vs CVE Focus
- - Why Misconfigurations Cause Breaches
- - Configuration Drift & Security Risks
- - Context-Driven Security Prioritization
- - Beyond CVEs: Real Risk Prioritization
- - Using Data Lakes for Security Context
- - Example: Phishing-Resistant MFA Risks
- - Understanding Misconfigurations with Context
- - Reducing Noise & Improving Security Decisions
- - Lessons from WAF & Security Deployment
- - How Reach Security Integrates with Existing Tools
- - API-Based Security Architecture Explained
- - The Future: Asset Intelligence & Security
- - Moving Beyond Vulnerability Management
- - Managing Risk Across All Asset Types
- - Connecting Security Data for Better Decisions
- - Final Thoughts on Exposure Management
Garrett Hamilton brings deep expertise in SaaS product management, go-to-market strategy, and cybersecurity leadership. As CEO and Co-Founder of Reach Security, he draws on his experience at industry leaders like Palo Alto Networks, where he guided the WildFire product from launch to over 60,000 customers. With a hands-on background in threat analysis, training, and consulting, Garrett is committed to driving Reach’s mission of transforming how organizations assess and remediate their security posture.
SC Awards Finalist: Security Executive of the Year – Ankur Shah – SCA26 #1
At RSAC 2026, Mike Shema speaks with Ankur Shah, CEO of Straiker.ai and a finalist for SC Awards Security Executive of the Year. Shah shares his leadership approach and perspective on today’s evolving cybersecurity landscape.
The SC Awards recognize leaders driving real-world impact across the industry.
Segment Resources:
https://www.straiker.ai/ https://www.linkedin.com/in/ankur-shah-aisec/
This segment is sponsored by Straiker.ai. Visit https://securityweekly.com/straikerrsac to learn more about them!
- - Welcome to SC Awards 2026 Interview
- - Meet Striker CEO & Security Executive of the Year
- - Cybersecurity Leadership & Community Impact
- - The AI Shift vs Cloud, Mobile & Internet
- - Rise of Agentic AI in Enterprises
- - Agents Building Agents Explained
- - Citizen Developers & AI Agent Platforms
- - Expanding Attack Surface with AI Agents
- - Why Traditional Security Controls Fail
- - Building AI-Native Security Stacks
- - Using AI to Secure AI (Agent vs Agent)
- - AI as a Force Multiplier for Professionals
- - Future of Work in the AI Era
- - How Leadership Is Changing with AI
- - Flat Organizations & Fewer Middle Managers
- - Industry Uncertainty & Rapid AI Evolution
- - Building with AI: Practical Advice
- - Automating Daily Work with AI Agents
- - Growth Strategy & Scaling Striker
- - Hiring Challenges in the AI Era
- - Advice for Students & AI-Native Talent
- - Securing Agent Ecosystems & Permissions
- - Striker as the AI Security Control Plane
- - Final Thoughts & Closing
Ankur Shah is a cybersecurity leader and entrepreneur with a proven track record of building and scaling innovative security solutions. As the Co-Founder and CEO of Straiker, he is focused on revolutionizing AI-driven security technologies. Previously, Ankur served as SVP & GM of Prisma Cloud at Palo Alto Networks, where he grew the cloud security (CNAPP) platform from a single module to an industry-leading Code To Cloud CNAPP Platform. He played a pivotal role in expanding its customer base and increasing revenue by 50x in 5 years. Before that, he led product development at RedLock, CipherCloud, and Symantec, driving advancements in cloud security, DLP, and AI-powered threat detection.
SC Awards Finalist: Best SME Security Solution – Stellar Cyber – Steve Garrison – SCA26 #1
At RSAC 2026, Mike Shema speaks with Steve Garrison of Stellar Cyber, finalist for Best SME Security Solution in the SC Awards Excellence category. Guha shares how Stellar Cyber is helping small and mid-sized organizations strengthen security and reduce risk.
The SC Awards recognize solutions delivering real-world impact in cybersecurity.
Segment Resources:
https://stellarcyber.ai/platform/capabilities-autonomous-soc/
This segment is sponsored by Stellar Cyber. Visit https://securityweekly.com/stellarrsac to learn more about them!
- - Welcome to SC Awards 2026
- - What is Stellar Cyber?
- - Why Outcomes Matter Over Buzzwords
- - Customer Results: Reducing False Positives & Boosting Productivity
- - MSSPs vs Mid-Market: Who Stellar Cyber Serves
- - Scaling Security Operations Without Increasing Cost
- - Building a Unified Security Platform
- - Human-Augmented Autonomous SOC Explained
- - Integrating Tools Like Vulnerability Scanners
- - Open Platform & Multi-Layer AI Approach
- - AI Since 2015: Before It Was Trendy
- - Avoiding Data Overload with Case Management
- - Connecting Alerts into Actionable Cases
- - Visualizing Threats Like a Complete Picture
- - Prioritizing Threats with Case Scoring
- - Using MITRE ATT&CK for Threat Context
- - What’s Next: Agentic AI & Automated Triage
- - Moving from Reactive to Proactive Security
- - Future Vision: Autonomous SOC & AI Defense
- - Scaling Security Teams Without Hiring More
- - Final Thoughts & Key Takeaways
SC Awards Finalist: Best Insider Threat Solution – EchoMark – Troy Batterberry – SCA26 #1
At RSAC 2026, Mike Shema speaks with Troy Batterberry of EchoMark, finalist for Best Insider Threat Solution in the SC Awards Trust category. Batterberry shares how EchoMark helps organizations detect and reduce insider risk.
The SC Awards recognize cybersecurity solutions delivering real-world impact.
Segment Resources:
Video - https://www.echomark.com/new-to-echomark The Leak Doom Loop - https://www.echomark.com/post/the-leak-doom-loop USA Today - https://www.usatoday.com/story/tech/columnists/2024/10/09/apple-data-leaks-artificial-intelligence-solution/75519299007/ Recent appearance at GDC - https://www.echomark.com/use-cases/gaming-entertainment
This segment is sponsored by EchoMark. Visit https://securityweekly.com/echomarkrsac to learn more about them!
- - Welcome to SC Awards 2026
- - What is EchoMark?
- - The Growing Threat of Insider Data Leaks
- - Why Insider Threats Are Increasing (AI & Agents)
- - Who Needs Insider Threat Protection?
- - Introducing Forensic Watermarking Technology
- - Watermarking Text, Images, Video & Source Code
- - Protecting Sensitive Data in the Age of AI
- - Identifying Leak Sources Quickly
- - Preventing Leaks vs Detecting Damage
- - Deterrence: Making Every Copy Traceable
- - Seamless User Experience Without Friction
- - No Client Software: Backend Watermarking Explained
- - Defending Against Malicious & Accidental Leaks
- - Future Roadmap: Expanding Content Protection
- - Screen-Level Watermarking for Enterprises
- - Use Case: Gaming Industry Leak Prevention
- - Scaling Deployment Across Organizations
- - Integration with Microsoft & Google Ecosystems
- - Real-World Use: Insider Threat Detection
- - Protecting Source Code & Intellectual Property
- - Cybersecurity Trends & Rising Insider Risks
- - Final Thoughts on Insider Threat Protection
Troy Batterberry is the founder and CEO of EchoMark, a Software-as-a-Service (SaaS) company pioneering a new standard in information protection. The company was founded on that trust is central to empowering everyone to do their best work. Troy brings years of product and technology experience, including 25 years at Microsoft, where he most recently served as a Corporate Vice President as the product leader of Microsoft Teams Meetings, Calling, and
Events. During his tenure, Troy also played an integral role in the growth and success of marquee Microsoft products, such as Windows, Explorer/Edge, Bing, Xbox, and MSN. Before joining Microsoft, Troy held engineering positions at Sony and within the U.S. Department of Defense. Troy is driven by a long-standing passion for creating new experiences and products.
In addition to his professional pursuits, Troy is a parent volunteer at his kids’ schools, spends time volunteering for Boy Scouts, and also enjoys time outdoors boating, hiking, and running. He holds an M.S. in Information Systems from the University of Southern California and a B.S. in Electrical and Electronic Engineering from North Dakota State University.
SC Awards Finalist: Best Threat Detection Technology – Gurucul – Saryu Nayyar – SCA26 #1
At RSAC 2026, Mike Shema speaks with Saryu Nayyar of Gurucul, finalist for Best Threat Detection Technology in the SC Awards Trust category. Nayyar shares how Gurucul is advancing threat detection and helping organizations respond faster to risk.
The SC Awards recognize solutions delivering real-world impact in cybersecurity.
Segment Resources:
https://gurucul.com/ https://gurucul.com/press-releases/gurucul-research-demonstrates-ai-is-the-new-insider-threat-as-90-of-organizations-experience-incidents/
This segment is sponsored by Gurucul. Visit https://securityweekly.com/guruculrsac to learn more about them!
- - Welcome to SC Awards 2026
- - What is Gurucul?
- - AI-Powered Threat Detection Explained
- - Securing AI vs Using AI for Security
- - The Growing Threat of AI in Cybersecurity
- - Enterprise vs Mid-Market AI Adoption
- - MSSPs and the Shift to AI MDR
- - Deploying AI SOC Quickly & Efficiently
- - Reducing Costs with AI Data Pipelines
- - AI-Driven Threat Detection & Behavior Analytics
- - AI Analyst: Reducing SOC Workload by 83%
- - Addressing AI Hallucinations & False Positives
- - Auto-Triage & Explainable AI in SOC
- - Eliminating Level 1 Analyst Work
- - Human-Led, AI-Supported SOC Model
- - New Threat Landscape with AI Agents
- - Detecting Shadow AI in Enterprises
- - Behavior Analytics for AI Agents
- - Deploying with Data Lakes & Integrations
- - 700+ Integrations & AI MDR Capabilities
- - Vendor-Agnostic Approach Explained
- - Avoiding Vendor Lock-In with Data Ownership
- - What’s Next: Open AI SOC Platform
- - Building an Army of AI SOC Agents
- - AI CISO & Role-Based AI Assistants
- - Customer Reactions to AI SOC Evolution
- - Final Thoughts & Key Takeaways
Saryu Nayyar is an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council. She has more than 15 years of experience in the information security, identity and access management, IT risk and compliance, and security risk management sectors.
She was named EY Entrepreneurial Winning Women in 2017. She has held leadership roles in security products and services strategy at Oracle, Simeio, Sun Microsystems, Vaau (acquired by Sun) and Disney. Saryu also spent several years in senior positions at the technology security and risk management practice of Ernst & Young.
She is passionate about building disruptive technologies and has several patents pending for behavior analytics, anomaly detection and dynamic risk scoring inventions.
SC Awards Finalist: TXOne Networks – Terence Liu – SCA26 #1
At RSAC 2026, Mike Shema speaks with Terence Liu of TXOne Networks, finalist for Best Endpoint Security Solution in the SC Awards Trust category. Liu shares how TXOne is helping organizations protect endpoints and reduce cyber risk.
The SC Awards recognize cybersecurity solutions delivering real-world impact.
This segment is sponsored by TXOne Networks. Visit https://securityweekly.com/txonersac to learn more about them!
- - Welcome to SC Awards 2026 Interview
- - Meet TXOne Networks & OT Security Focus
- - What is OT / ICS Cybersecurity?
- - Challenges Securing Industrial Environments
- - Why OT Environments Are Highly Fragmented
- - One-Size-Does-NOT-Fit-All in OT Security
- - Legacy Systems: Windows XP, DOS & Beyond
- - Biggest Challenge: Supporting Legacy Systems
- - What OT Customers Really Need from Security
- - Balancing Security, Safety & Productivity
- - Introducing Stellar Endpoint Protection
- - Application Whitelisting for OT Systems
- - Why Many Factories Lack Basic Security
- - Preventing Ransomware in Industrial Networks
- - CPSDR: OT Detection & Response Explained
- - Reducing False Positives with Whitelisting
- - Why OT Still Relies on Antivirus Basics
- - Managing Change in Industrial Systems
- - Risks of Updates & Maintenance Windows
- - Deployment Challenges in OT Environments
- - People, Process, Technology in OT Security
- - Designing Simple Yet Effective Security
- - Safe Software Updates & N-1 Strategy
- - Final Thoughts on OT Cybersecurity
Terence is the CEO of TXOne Networks, a leading provider of cybersecurity solutions for operational technology (OT) and industrial control systems. He is focused on protecting critical infrastructure and ensuring the reliability and safety of industrial environments in an increasingly connected world.
Prior to this role, Terence served as Vice President at Trend Micro, where he led the Network Threat Defense Technology Group and expanded the company’s reach into telecommunications and IoT security. Earlier in his career, he was CEO of Broadweb, where he developed its deep-packet-inspection (DPI) strategy and led the company through its acquisition by Trend Micro in 2013. Terence holds a Ph.D. and M.S. in Computer Science from National Tsing-Hua University and has authored multiple patents and academic publications.
SC Awards Finalist: Best SASE Solution – Zenarmor – Murat Balaban – SCA26 #1
At RSAC 2026, Mike Shema speaks with Murat Balaban of Zenarmor, finalist for Best SASE Solution in the SC Awards Trust category. Balaban shares how Zenarmor is helping organizations modernize network security and reduce risk.
The SC Awards recognize cybersecurity solutions delivering real-world impact.
This segment is sponsored by Zenarmor. Visit https://securityweekly.com/zenarmorrsac to learn more about them!
- - Welcome to SC Awards 2026 Interview
- - Meet Zenarmor & Company Overview
- - Why Modern Organizations Are Distributed
- - The Rise of Remote Work & Micro Branch Offices
- - Limitations of Legacy Network Security (VPN & Appliances)
- - What is SASE & Why It Falls Short
- - The Problem with Centralized Security Architectures
- - Eliminating Latency in Modern Security
- - Deploying Security Directly on Endpoints
- - Single Application Security Architecture Explained
- - Built-in Features: CASB, ZTNA, SWG & Firewall
- - Balancing Security with User Experience
- - Policy Control, Identity & Device Security Posture
- - Easy Deployment Without Changing Infrastructure
- - Replacing Multiple Security Tools with One Solution
- - Why Simplicity is the Future of Cybersecurity
- - Securing AI Agents & Emerging Identity Risks
- - Observability for AI & Human Activity
- - Managing AI Usage in Enterprises
- - What’s Next for ZenArmor
- - Final Thoughts & Closing
Murat is the founder and CEO of Zenarmor, a company operating in the SASE network security space. With over 20 years of experience, he has dedicated his career to crafting innovative commercial and open source products that resonate with audiences worldwide. He has been in the founding team of several other cyber security startups and non-profit organizations.
A graduate of Bogazici University, Istanbul, Turkey; Murat holds a Bachelor of Science degree in Management Information Systems. His academic foundation, coupled with his entrepreneurial spirit and dedication to technological advancement, continues to drive his success in shaping the future of cybersecurity.
SC Awards Finalist: Best Insider Threat Solution – Vectra AI – Mark Wojtasiak – SCA26 #1
At RSAC 2026, Mike Shema speaks with Mark Wojtasiak of Vectra AI, finalist for Best Insider Threat Solution in the SC Awards Trust category. Wojtasiak shares how Vectra AI helps organizations detect and respond to insider threats.
The SC Awards recognize cybersecurity solutions delivering real-world impact.
Segment Resources:
Woj’s recent bylines: https://vmblog.com/archive/2026/01/15/cybersecurity-s-next-chapter-how-attackers-defenders-and-ai-will-evolve.aspx https://ai-techpark.com/aitech-interview-with-mark-wojtasiak/
Recent company press releases: https://www.vectra.ai/about/news/vectra-ai-appoints-chad-reese-as-senior-vice-president-global-channel-chief-to-accelerate-partner-led-growth https://www.vectra.ai/about/news/new-vectra-ai-research-finds-cyber-resilience-lagging-in-the-ai-era https://www.vectra.ai/about/news/vectra-ai-launches-next-generation-platform
This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them!
- - Welcome to SC Awards 2026 Interview
- - Meet Vectra AI & Product Strategy Overview
- - Core Challenge: Who’s On Your Network?
- - Hybrid Enterprise Security (Cloud, OT, IoT)
- - Why Visibility Is Still a Major Problem
- - Security Silos: Cloud, Identity & Endpoint Gaps
- - Achieving Unified Network Observability
- - AI/ML Models for Threat Detection
- - Correlating Threat Events Across Systems
- - Detecting Insider Threats & Privilege Abuse
- - Why the Network Reveals the Truth
- - Continuous Monitoring & Exposure Detection
- - Closing Visibility Gaps in Asset Inventory
- - Identity vs Asset: What Are You Securing?
- - Why Asset Inventory Becomes Obsolete Fast
- - Faster Attacks with AI & Automation
- - Living-Off-the-Land Attacks Explained
- - Thinking Like an Attacker
- - Credential Abuse & Initial Access Risks
- - Future Roadmap & Continuous AI Detection Updates
- - Observing AI Agents & Shadow AI Risks
- - Policy Violations & Accidental Insider Threats
- - Reducing SOC Noise with Entity-Based Detection
- - Final Thoughts & Where to Learn More
Mark, also known as Woj, is the Vice President of Product Research and Strategy at Vectra AI. Passionate about cybersecurity and dedicated to simplifying the complex, Woj consistently advocates for cyber defenders in his approach to product development, marketing, and leadership. He focuses on translating real-world attacker behavior into practical innovations to help security teams detect, investigate, and stop threats faster and with greater confidence.
With deep insight into the evolving threat landscape, Woj works at the intersection of research and product strategy to ensure Vectra AI’s solutions address the real challenges security teams face every day. He is particularly focused on identity-driven attacks, AI-enabled threats, and hybrid cloud risk, and is known for turning technical complexity into clear, actionable strategy for customers and industry peers alike.
SC Awards Finalist: Best Identity Management Solution – Teleport – Diana Jovin – SCA26 #1
Coming Soon! At RSAC 2026, Mike Shema speaks with Diana Jovin of Teleport, finalist for Best Identity Management Solution in the SC Awards Trust category. Jovin shares how Teleport is helping organizations strengthen identity security and access control.
The SC Awards recognize cybersecurity solutions delivering real-world impact.
Segment Resources:
Our latest launch: Beams https://goteleport.com/about/newsroom/press-releases/teleport-launches-beams-trusted-agent-runtimes-for-infrastructure/
Generally: Teleport unifies identities — humans, machines, and AI — with strong identity implementation to speed up engineering, improve resiliency against identity-based attacks, and control AI in production infrastructure.
This segment is sponsored by Teleport. Visit https://securityweekly.com/teleportrsac to learn more about them!
- - Welcome to SC Awards 2026 Interview
- - Meet Teleport & Identity Security Overview
- - The Problem: Fragmented Identity & Secrets
- - AI Risks in Poorly Secured Environments
- - Unifying Human, Machine & AI Identities
- - Eliminating Passwords & Standing Privileges
- - Cryptographic Identity vs Traditional Authentication
- - Simplifying Compliance & Audit Processes
- - Reducing Attack Surface by Removing Secrets
- - Improving Developer Experience with Security
- - Why Usability Drives Security Adoption
- - Managing Agentic AI Identities
- - Why AI Agents Must Be First-Class Identities
- - Controlling Non-Deterministic AI Behavior
- - Over-Privileged Agents & Security Risks
- - Preventing Prompt Injection & Data Exposure
- - Fast Deployment Without Disrupting Systems
- - Integrating with Existing Identity Providers
- - Governance, Compliance & Privileged Access
- - Shadow AI & Hidden Enterprise Risks
- - Future of AI Identity Security & Roadmap
- - Policy-Driven Identity & Access Control
- - Maintaining Security at Scale with AI Growth
- - Final Thoughts & Closing
Diana Jovin is CMO at Teleport. With over 30 years of experience, she brings deep expertise in marketing and business development leadership for B2B technology companies. A strategic and analytical thinker, Diana excels at defining corporate and product positioning, building thought leadership platforms, empowering global sales organizations, and executing go-to-market strategies that drive business growth.
At Teleport, Diana is a driving force in articulating and championing the company’s vision for Infrastructure Identity and its critical role in enabling trusted computing.
SC Awards Finalist: Best Enterprise Security Solution – Island – Michael Leland – SCA26 #1
At RSAC 2026, Mike Shema speaks with Michael Leland of Island, finalist for Best Enterprise Security Solution in the SC Awards Excellence category. Leland shares how Island is helping organizations strengthen enterprise security and reduce risk.
The SC Awards recognize solutions delivering real-world impact in cybersecurity.
Segment Resources:
https://tei.forrester.com/go/Island/IslandTEI/index.html?lang=en-us
https://tei.forrester.com/go/Island/IslandTEI/index.html?lang=en-us
https://www.island.io/press/island-rebuilds-sase-for-the-age-of-modern-work
https://www.island.io/press/new-island-enterprise-platform
This segment is sponsored by Island. Visit https://securityweekly.com/islandrsac to learn more about them!
- - Welcome to SC Awards 2026
- - Introduction to Island Enterprise Browser
- - Why Consumer Browsers Are a Security Risk
- - Building a Secure Enterprise Browser
- - Enterprise Trust, Identity & Policy Control
- - Application Data Boundary Explained
- - Extending Security Beyond the Browser
- - AI Shift from Cloud to Desktop Risks
- - Understanding AI User Intent & Local Threats
- - Browser Hardening & Attack Surface Reduction
- - Protection Against Zero-Day Vulnerabilities
- - Risks of AI Browsers Built on Chromium
- - Controlling AI Access with Policy Guardrails
- - Managing Shadow AI & Application Sprawl
- - Dangerous AI Extensions & Supply Chain Risks
- - Preventing Data Leaks in AI Tools
- - Handling Personal vs Corporate AI Usage
- - Secure Use of Extensions like Grammarly
- - Balancing Security with User Experience
- - Improving Admin & End-User UX
- - Reducing Complexity Across Security Tools
- - Dynamic Policy & Context-Aware Security
- - Real-Time Data Protection Without User Action
- - Customer-Driven Innovation & Features
- - Digital Experience Monitoring & Performance
- - Remote Support & System Observability
- - Rapid Innovation & Feature Development
- - Final Thoughts & Where to Learn More
Michael is Field CTO at Island, bringing over 30 years of data networking, operations, and cybersecurity domain expertise. He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap as well as the identity security portfolio. Prior to SentinelOne, he held the title of Chief Technical Strategist for McAfee. Michael was the co-founder and CTO of NitroSecurity – later acquired by McAfee – where he was responsible for developing and implementing their overall SIEM technology vision and roadmap and has held senior technical management positions at Cabletron and Avaya.
SC Awards Finalist: Best Application Security Solution – RoonCyber – Gene Fay – SCA26 #1
At RSAC 2026, Mike Shema speaks with Gene Fay of RoonCyber, finalist for Best Application Security Solution in the SC Awards Trust category. Fay shares how RoonCyber is helping organizations secure applications and reduce risk.
The SC Awards recognize cybersecurity solutions delivering real-world impact.
Segment Resources:
RoonCyber AI Workloads 1-Pager (Quick Overview) https://2187797.fs1.hubspotusercontent-na1.net/hubfs/2187797/RoonCyberAIWorkloads_One-Page.pdf
Press Release – AI Runtime Security Launch https://www.rooncyber.com/resource/rooncyber-introduces-ai-runtime-security-to-protect-ai-driven-workloads-in-the-cloud
Blog – Why Securing AI Workloads Requires Runtime Visibility https://www.rooncyber.com/resource/why-securing-ai-workloads-requires-runtime-visibility
YouTube Demo – Unifying Runtime, Cloud, and Business Risk https://www.youtube.com/watch?v=dgoHF11dSSM
This segment is sponsored by RoonCyber. Visit https://securityweekly.com/rooncyberrsac to learn more about them!
- - Welcome to SC Awards 2026 Interview
- - Introducing Rune Cyber & Runtime CNAPP
- - What is Runtime CNAPP & Why It Matters
- - AI, LLMs & Agent Security Concerns
- - Managing AI Agent Lifecycle & Ownership
- - The Importance of Runtime Visibility
- - eBPF Sensors for Frictionless Security
- - Benefits of eBPF vs Traditional Agents
- - Improving CISO & Engineering Collaboration
- - Reducing Vulnerability Noise with Runtime Data
- - Prioritizing Exploitable Vulnerabilities
- - AI Accelerating Development & Security Risks
- - “Eating Your Own Dog Food” in Security
- - Mid-Market Security Challenges Explained
- - AI Uncertainty & Security Strategy Gaps
- - Shadow AI & Governance Challenges
- - Real-World AI Data Leakage Risks
- - Expanding Security Beyond Code to AI Use Cases
- - Shift Left vs Runtime Security Debate
- - Aligning Security & Engineering Incentives
- - Future Roadmap: AI Workload Security
- - Final Thoughts & Closing
Gene has a lengthy track record as an executive at technology companies, including COO at White Ops, General Manager at Resilient Systems (acquired by IBM), and VP of Worldwide Sales and Global Alliances of Network Intelligence (acquired by EMC and integrated into RSA). Gene has extensive experience building high-impact teams at early-stage startups in storage, virtualization, and cybersecurity. He has specific expertise in go-to-market strategies, marketing, customer success, and channel development. Gene holds an MBA from Northeastern University, where he guest lectures on topics such as product management, marketing, and sales
SC Awards Finalist: Best Professional Certification Program – ISACA – Mary Carmichael – SCA26 #1
At RSAC 2026, Mike Shema speaks with Mary Carmichael of ISACA, finalist for Best Professional Certification Program in the SC Awards Excellence category. Carmichael discusses the role of certifications in building a stronger cybersecurity workforce.
The SC Awards recognize excellence and impact across the cybersecurity community.
Segment Resources:
https://www.isaca.org/credentialing/cisa https://www.isaca.org/credentialing/cism https://www.isaca.org/credentialing/aaia https://www.isaca.org/credentialing/aaism https://www.isaca.org/credentialing/aair https://www.isaca.org/resources/artificial-intelligence
This segment is sponsored by ISACA. Visit https://securityweekly.com/isacarsac to learn more about them!
- - Welcome to SC Awards 2026
- - Introduction to ISACA & Global Community
- - ISACA Certifications: CISA, Risk, Security & AI
- - The Evolution of IT Auditing to AI Systems
- - Why Cybersecurity Requires Diverse Expertise
- - AI in Business: Trust, Risk & Third-Party Systems
- - Evaluating AI Risk & Vendor Trust (SOC 2, Controls)
- - AI Use Cases: Chatbots, Automation & Decision Systems
- - Building Trust in AI Through Context & Controls
- - AI vs Traditional Automation Explained
- - Digital Transformation Lessons for AI Adoption
- - Workforce Impact & New AI Roles
- - Do You Really Need AI? ROI & Cost Considerations
- - AI Implementation Challenges & Operating Models
- - Human Accountability in AI Systems
- - ISACA Chapters, Mentorship & Networking Benefits
- - Community Collaboration & Industry Partnerships
- - Cybersecurity Bootcamps & Career Pathways
- - Transitioning Into Cybersecurity Careers
- - Importance of Information Sharing in Security
- - New AI Risk Management Certification (Preview)
- - Risk Frameworks, OWASP & AI Security Controls
- - Managing Prompt Injection & AI Threats
- - Business Value vs Risk in AI Adoption
- - Why You Should Embrace AI (Not Avoid It)
- - Final Thoughts: Join the Cybersecurity Community
Mary Carmichael is the Managing Director of Risk Advisory at Momentum Technology, with over 15 years of experience in technology risk management. Her expertise spans multiple sectors, including higher education, government, and energy, with a strong focus on third-party risk management, including vendor assessment and due diligence activities for systems procurement. Mary is a Member of the ISACA Global CRISC Committee and the Emerging Trends Working Group, where she offers insights on AI’s implications for governance, risk, and compliance functions. A published author and global speaker, Mary also serves as President of ISACA’s Vancouver Canada Chapter and is a speaker on the transformative effects of emerging technologies on business operations.





























