We invest hours analyzing a security risk, and that effort makes us overvalue the recommendation. An executive who hasn't shared that analysis weighs the same risk differently, and they might be right.

https://zeltser.com/rejected-security-recommendations

#cybersecurity #securityleadership #CISO #infosec

When Executives Reject Your Security Recommendation

A rejected security recommendation feels personal, but it often reflects competing demands the security team doesn't fully see. Knowing how to act on that reality helps the CISO become someone the business trusts with its priorities.

Lenny Zeltser

As we automate more security work, stakeholders trust what they can see. Making them feel secure is as much our job as making them secure.

https://zeltser.com/importance-of-feeling-secure

#cybersecurity #infosec #securityleadership

The Importance of Feeling Secure

Security teams that focus only on being secure, without making protections visible, risk losing stakeholder confidence. Nobody trusts what they can't see, whether that's automated defenses, AI-driven tools, or competent but quiet leadership.

Lenny Zeltser

When DevOps overwhelmed security reviews, the same velocity let teams patch in minutes instead of waiting for quarterly releases. Vibe coding by non-developers is the next shift where that speed works in our favor.

https://zeltser.com/security-governance-vibe-coding

#cybersecurity #infosec #securityleadership #AI

Security Governance at the Speed of Vibe Coding

Employees who've never written code now build production apps using AI, without security review, dependency scanning, or enterprise oversight. The SaaS and DevOps transitions give security teams a starting governance approach for this.

Lenny Zeltser

๐Ÿง Turn your team into threat hunters, one dice roll at a time ๐Ÿ’ฅ

๐ŸŽฒ ๐——๐—จ๐—ก๐—š๐—˜๐—ข๐—ก๐—ฆ & ๐——๐—ฅ๐—”๐—š๐—ข๐—ก๐—ฆ: ๐—ง๐—›๐—˜ ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—ฃ๐—ข๐—ช๐—˜๐—ฅ ๐—ง๐—ข๐—ข๐—Ÿ ๐—ฌ๐—ข๐—จ ๐——๐—œ๐——๐—กโ€™๐—ง ๐—ž๐—ก๐—ข๐—ช ๐—ฌ๐—ข๐—จ ๐—ก๐—˜๐—˜๐——๐—˜๐—— - Klaus Agnoletti ( @klausagnoletti ) & Glen Sorensen ๐Ÿ›ก๏ธ

Roleplaying isnโ€™t just for nerds, itโ€™s a proven method for building real security muscle. This talk reveals how structured tabletop roleplaying games unlock deeper learning, improve team cohesion, and turn abstract security concepts into lived experience. By simulating incident response, threat modeling, and zero-trust design through narrative-driven play, teams develop adaptive thinking, shared mental models, and faster decision-making under pressure.

Klaus Agnoletti https://www.linkedin.com/in/agnoletti/ is a freelance storytelling cyber security advisor, co-founder of BSides Kรธbenhavn, neurodiversity advocate, and architect of playful security transformation through narrative and gamification.

Glen Sorensen https://pretalx.com/bsidesluxembourg-2026/speaker/J3PRCC/ is a Solutions Engineer at DeleteMe, former vCISO, and incident master for HackBack Gaming. 20+ years in security engineering, GRC, and operations. Passionate about OSINT, AI-powered social engineering, and using tabletop games to train real-world response.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #GamifiedSecurity #CyberTraining #IncidentResponse #RolePlaying #SecurityLeadership #InfosecEducation #PlayToLearn

We adapted security governance to SaaS adoption and DevOps velocity. Vibe coding by non-developers is the next comparable shift, and those transitions give us a starting approach, even though the timeline is shorter.

https://zeltser.com/security-governance-vibe-coding

#cybersecurity #infosec #securityleadership #AI

Security Governance at the Speed of Vibe Coding

Employees who've never written code now build production apps using AI, without security review, dependency scanning, or enterprise oversight. The SaaS and DevOps transitions give security teams a starting governance approach for this.

Lenny Zeltser

Just Announced for BSides Luxembourg 2026!
๐—ž๐—˜๐—ฌ๐—ก๐—ข๐—ง๐—˜: ๐—œ๐——๐—˜๐—ก๐—ง๐—œ๐—ง๐—ฌ ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—๐—จ๐—ฆ๐—ง ๐—˜๐—ซ๐—ฃ๐—Ÿ๐—ข๐——๐—˜๐—— - Wendy Nather (@wendynather )

As identity ecosystems evolve, some challenges never quite get solvedโ€”delegation being one of them. But now, the stakes are higher than ever. With the rapid rise of non-human identities that donโ€™t fit traditional system or application roles, organizations are facing a new layer of complexity. Even if youโ€™re not actively using these โ€œagentsโ€ yet, theyโ€™re already becoming part of the broader digital environment. The question is no longer ifโ€”but how youโ€™ll manage them. Itโ€™s time to start making deliberate decisions about identity, access, and control in this expanding landscape.

Wendy Nather ( @wendynather ) is a strategist, research director, and former CISO with over 40 years of experience in IT operations and security. Her expertise includes identity and access management, threat intelligence, risk analysis, and security operations, shaped by leadership roles in financial services, government, and industry research.
๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #IdentityManagement #CyberSecurity #IAM #DigitalIdentity #SecurityLeadership

Vendor evaluations are broken.

Why don't we get to choose who we talk to? SageTap fixes one part of it: async vendor browsing, you apply for calls, 30-60 min, anonymous, paid. Not retire-early money, but a decent dinner. You decide at the end whether to reveal yourself.

And if the meetings aren't free, they're not for nothing.

Referral link (I get a credit if you sign up and complete your first vendor call): https://sagetap.cello.so/rSvWkKHVAIx

#CISO #SecurityLeadership

Sagetap | You're Invited

Join Sagetap's community of tech leaders to anonymously match and meet with the industry's most credible technology vendors. No spam or unwanted follow-ups.

Every organization has a โ€œMike.โ€

The one who knows how everything works.

Thatโ€™s not a strength. Thatโ€™s a risk.

New article: When Security Architecture Depends on Tribal Knowledge

https://jimguckin.com/2026/03/19/when-security-architecture-depends-on-tribal-knowledge/

#CyberSecurity #SecurityArchitecture #InfoSec #SecurityLeadership