https://youtu.be/SFvZ_KjjAPA #AIsecurity #CyberSecurity #ArtificialIntelligence #AIrisks #AgenticAI #ZeroTrust #LeastPrivilege #AccessControl #InfoSec #CyberRisk #DataSecurity #EnterpriseSecurity #AIgovernance #SecurityLeadership
We invest hours analyzing a security risk, and that effort makes us overvalue the recommendation. An executive who hasn't shared that analysis weighs the same risk differently, and they might be right.
As we automate more security work, stakeholders trust what they can see. Making them feel secure is as much our job as making them secure.
When DevOps overwhelmed security reviews, the same velocity let teams patch in minutes instead of waiting for quarterly releases. Vibe coding by non-developers is the next shift where that speed works in our favor.
๐ง Turn your team into threat hunters, one dice roll at a time ๐ฅ
๐ฒ ๐๐จ๐ก๐๐๐ข๐ก๐ฆ & ๐๐ฅ๐๐๐ข๐ก๐ฆ: ๐ง๐๐ ๐ฆ๐๐๐จ๐ฅ๐๐ง๐ฌ ๐ฃ๐ข๐ช๐๐ฅ ๐ง๐ข๐ข๐ ๐ฌ๐ข๐จ ๐๐๐๐กโ๐ง ๐๐ก๐ข๐ช ๐ฌ๐ข๐จ ๐ก๐๐๐๐๐ - Klaus Agnoletti ( @klausagnoletti ) & Glen Sorensen ๐ก๏ธ
Roleplaying isnโt just for nerds, itโs a proven method for building real security muscle. This talk reveals how structured tabletop roleplaying games unlock deeper learning, improve team cohesion, and turn abstract security concepts into lived experience. By simulating incident response, threat modeling, and zero-trust design through narrative-driven play, teams develop adaptive thinking, shared mental models, and faster decision-making under pressure.
Klaus Agnoletti https://www.linkedin.com/in/agnoletti/ is a freelance storytelling cyber security advisor, co-founder of BSides Kรธbenhavn, neurodiversity advocate, and architect of playful security transformation through narrative and gamification.
Glen Sorensen https://pretalx.com/bsidesluxembourg-2026/speaker/J3PRCC/ is a Solutions Engineer at DeleteMe, former vCISO, and incident master for HackBack Gaming. 20+ years in security engineering, GRC, and operations. Passionate about OSINT, AI-powered social engineering, and using tabletop games to train real-world response.
๐
Conference Dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg #GamifiedSecurity #CyberTraining #IncidentResponse #RolePlaying #SecurityLeadership #InfosecEducation #PlayToLearn
We adapted security governance to SaaS adoption and DevOps velocity. Vibe coding by non-developers is the next comparable shift, and those transitions give us a starting approach, even though the timeline is shorter.
Just Announced for BSides Luxembourg 2026!
๐๐๐ฌ๐ก๐ข๐ง๐: ๐๐๐๐ก๐ง๐๐ง๐ฌ ๐ฆ๐๐๐จ๐ฅ๐๐ง๐ฌ ๐๐จ๐ฆ๐ง ๐๐ซ๐ฃ๐๐ข๐๐๐ - Wendy Nather (@wendynather )
As identity ecosystems evolve, some challenges never quite get solvedโdelegation being one of them. But now, the stakes are higher than ever. With the rapid rise of non-human identities that donโt fit traditional system or application roles, organizations are facing a new layer of complexity. Even if youโre not actively using these โagentsโ yet, theyโre already becoming part of the broader digital environment. The question is no longer ifโbut how youโll manage them. Itโs time to start making deliberate decisions about identity, access, and control in this expanding landscape.
Wendy Nather ( @wendynather ) is a strategist, research director, and former CISO with over 40 years of experience in IT operations and security. Her expertise includes identity and access management, threat intelligence, risk analysis, and security operations, shaped by leadership roles in financial services, government, and industry research.
๐
Conference Dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg #IdentityManagement #CyberSecurity #IAM #DigitalIdentity #SecurityLeadership
Vendor evaluations are broken.
Why don't we get to choose who we talk to? SageTap fixes one part of it: async vendor browsing, you apply for calls, 30-60 min, anonymous, paid. Not retire-early money, but a decent dinner. You decide at the end whether to reveal yourself.
And if the meetings aren't free, they're not for nothing.
Referral link (I get a credit if you sign up and complete your first vendor call): https://sagetap.cello.so/rSvWkKHVAIx
Every organization has a โMike.โ
The one who knows how everything works.
Thatโs not a strength. Thatโs a risk.
New article: When Security Architecture Depends on Tribal Knowledge
https://jimguckin.com/2026/03/19/when-security-architecture-depends-on-tribal-knowledge/
#CyberSecurity #SecurityArchitecture #InfoSec #SecurityLeadership
The fastest deal is useless if your vendor opens the wrong door ๐ช
#CyberSecurity #DataProtection #InformationSecurity #Infosec #Compliance #ITSecurity #CyberRisk #CyberAwareness #DigitalSecurity #SecurityLeadership #BusinessContinuity #RiskAssessment #ISMS #ISO27001 #CISO