AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

The Security Reset: A Leadership Guide to Clarity, Control & Real Risk

Date:
Thursday, May 28
Time:
2 p.m. ET / 7 p.m. GMT
Virtual Session The Security Reset: A Leadership Guide to Clarity, Control & Real Risk with grey design behind.

Security leaders don’t get a clean start. They inherit complexity. Years of growth, quick decisions, and shifting priorities leave behind app sprawl, IAM gaps, vendor risk, and limited visibility into what actually matters. Now add shadow AI and a threat landscape that is moving faster than most teams can track.

The problem isn’t a lack of data. It’s knowing where to act.

In this session, Jessica Stinson reframes security leadership using an attacker’s methodology: Recon. Exploit. Persist. Not as a one-time exercise, but as an ongoing way to understand the environment, focus effort, and drive meaningful progress.

We also look at how AI is shaping this cycle in practical terms: where it is accelerating attacker capability, where it is introducing new blind spots, and where it is simply adding noise.

Think like an attacker to cut through noise and act on what actually reduces risk.

What you’ll take away:

  1. How to prioritize investments tied to mission-critical services
  2. Where AI is materially changing risk, and where it is not
  3. A simple way to prioritize using attacker logic and “5s and 20s” thinking
  4. How to reduce accumulated security debt without adding more noise
  5. How to test resiliency assumptions against real-world disruption
  6. How to align remediation to business continuity outcomes

Who should attend:

CISOs, Deputy CISOs, VPs of Security, Heads of Security Architecture, Security Engineering Leaders, and Risk & Threat Leaders


Jessica Stinson BF Headshot

About the speaker, Jessica Stinson

Solutions Engineering Lead

Jessica Stinson is a Solutions Engineering Lead at Bishop Fox, serving as a trusted advisor throughout the sales process, collaborating with delivery teams to ensure seamless client on-boarding and long-term satisfaction. Previously, Jessica was a Security Consultant III at Bishop Fox focused on Application Security, Cloud Security, and Source Code Review. Jessica's experience ranges from testing applications, internal and external networks, and cloud-based infrastructures for current threats and vulnerabilities with an emphasis on application and cloud security to conducting source code review, analyzing system architecture and threat models while using internal and external tools to identify vulnerabilities within applications and networks.


Nick Selby Bio Profile Image

About the speaker, Nick Selby

Managing Partner, EPSD, Inc.

An accomplished private and public sector technology professional, Nick identifies and helps resolve the technical and organizational issues that hold companies back from their true growth potential. Nick served as EVP of Strategy and Managed Services at Evertas; as VP of the Software Assurance Practice at Trail of Bits, and Chief Security Officer at Paxos Trust Company. Prior to this, Nick served as the NYPD Intelligence Bureau's Director of Cyber Intelligence and Investigations, where he helped the department understand how it investigates online, and how cyber-enabled crime affects New Yorkers. In 2005, he founded the information security practice at industry analyst firm 451 Research, where he served as 451’s Vice President, Research Operations until 2009.

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.