Content Type
Date Range
Faculty

Lisa brings over 25 years of experience in Intelligence, IT, Cybersecurity, and Leadership supporting the U.S. Government, financial services, life sciences, and industrial manufacturing sectors. She currently serves as the Regional CISO for an industrial manufacturer and has held positions as Deputy CISO and VP of Cyber Security Strategy and Solutions in big-pharma, Global Head of Cyber Threat Intelligence and Director of Security Operations in finance, a myriad of IT/Cyber/Intelligence positions within and across the US Government, and is a US Air Force Veteran.

Event | Feb/19/2026
The Model Context Protocol (MCP), an open standard defining how AI assistants connect to external data sources and tools, is becoming vital infrastructure for generative and agentic AI applications. As organizations rapidly adopt these capabilities while managing risks, this symposium helps security leaders understand MCP's architecture, why vendors are quickly developing MCP servers, and the security risks of connecting AI systems to enterprise resources. We also explore how AI Security Posture Management (AI-SPM) tools are evolving to address these challenges and provide practical frameworks for managing MCP-enabled AI deployments.
Tools & Guides | Dec/2/2025
In Board Boot Camp: Building Your Deck, we cover the distinct purpose of a board deck and how to adapt that purpose to subcommittees, tips for constructing the deck, including types of slides to include, and a timeline broken down to specific tasks to complete at each stage of developing your deck.
Blog | Dec/2/2025
AI model training requires production data, forcing CISOs to rethink security policies. Learn how to balance AI development needs with data protection controls.
Blog | Nov/25/2025
Our 2025 CISO compensation report offers powerful salary benchmarking insights, supports budget justification, and reveals opportunities for talent development and AI-driven advancement.
Event | Jan/28/2026
Whether concerned with the increased risks of data exfiltration via AI or the growing infiltration of imposter North Korean remote workers, organizations are looking for ways to enhance protection of insider threat risks. This symposium provides specific, actionable recommendations whether you’re just standing up a program or looking to mature and modernize it. We’ll share strategies to improve your monitoring within Legacy Applications, M365, Azure, AWS and GCP environments, and recommend processes for cross-functional collaboration to identify key applications and data, establish baselines for day-to-day activity, detect anomalies and respond to risks.
Blog | Nov/21/2025
Learn how to develop a framework for governing AI identities that details best practices and architectural patterns for managing their lifecycle and outlines a roadmap for implementation.
Tools & Guides | Nov/18/2025
This report explains how to enable AI development teams to safely use production data and warns against the temptation to allow production data in all development environments.
Blog | Nov/18/2025
The challenges and opportunities of compliance in the age of AI include AI’s capabilities, transparency, ethical concerns, and responsible data use.
Faculty

Scott is the Vice President of Global Cybersecurity for an international firm in the aviation sector. His background spans 25 years, beginning with operations and engineering work at companies like Raytheon and Symantec. Scott has since held senior leadership positions, including Chief Information Security Officer (CISO), across three diverse industries: utilities, financial services, and technology. In addition to his current role, Scott serves as a board member at US VALOR.