ISSA - New England
issa_logo_3
December 2025 Meeting

Join us at our

Annual Membership Meeting & Sponsor Showcase

December 9th, 2025, 9:00 AM - 3:00 PM

@

The Connors Center

Cost: Free to all ISSA NE Members

What's In Store?

 
Join us for our Annual Membership Meeting & Sponsor Showcase on December 9th at the Connors Center from 9:00 AM - 3:00 PM! This special event recognizes and celebrates the valued members as well as our wonderful sponsors who make our year-round events possible. Without their generous support, we wouldn't be able to deliver the high-quality educational events, networking opportunities, and professional development programs that make our chapter so valuable to the cybersecurity community.

What to Expect:
Breakfast & lunch 
Networking opportunities
Solution Showcases
Updates on the Chapter
Bylaw discussion

Space is limited! Secure your spot today and join us!

ISSA Members: Free registration 

Non-Members: Learn about our membership benefits - General membership starting at $95/year

Meet our Speakers

Dan Bailey

VP, Board of Directors @ ISSA NE

Dan brings 25 years' infosec experience, a Ph.D. in Computer Science, and more than 55 US patents issued. He specializes in application security, especially around authentication and authorization.

 

This is Not a Place of Honor: Lessons in Risk Communication From the Nuclear Industry
  • Communication about risk with non-technical stakeholders including business leadership is difficult.  Information security professionals can learn a lot from other industries. As a case study, we will examine lessons learned from the nuclear industry, communicating about risks to the general public.

Jack Butler

Associate Director @ ISSA NE

Jack Butler is a Senior Solutions Engineer at Sumo Logic, specializing in logging, SIEM, and application security. He helps organizations modernize security operations, streamline data integration, and strengthen resilience against evolving threats. Jack also serves as an OWASP Boston chapter leader, helping advance security education, promote secure-by-design principles, and drive collaboration within the local community.

 

Tyler Tomlinson

 Threatlocker

Tyler Tomlinson is a cybersecurity professional with many years of experience delivering technology solutions across   Zero Trust at the Endpointdiverse industries. Holding a degree in Computer and Information Systems Security, he specializes in helping enterprises strengthen their security posture through Zero Trust and least privilege strategies. Tyler focuses on making complex product information clear, relevant, and actionable to address real-world gaps and use cases.    

 

Lev Nakhlis


Corelight

In a previous life, Lev was a Network Infrastructure Architect for a company in bankruptcy. With zero budget and a lean team, he couldn't buy security—he had to build it. Lev relied on creativity and open-source tools like Zeek (Bro) and Suricata to maintain visibility while migrating critical infrastructure from Rackspace to AWS, ensuring the lights stayed on even when resources were scarce.


That experience taught him that you can't secure what you can't see. After spending time at Rapid7 helping organizations solve broad security challenges—from AppSec and VM to XDR—Lev returned to his network roots. Now at Corelight, he helps defenders shine a light on the dark corners of the network where attackers love to hide and traverse—providing the deep visibility he once had to build by hand, only now it’s turn-key.

 

EDR Evasion: Defending against attacks that evade traditional detections
  • EDR Evasion is a growing trend amongst sophisticated threat actors looking to bypass traditional cybersecurity capabilities. This talk will explore the rise of EDR evasion and how NDR is uniquely equipped to enable organizations to detect these threats.

Kevin Kieda

 SentinelOne

Kevin is a highly experienced cybersecurity professional specializing in the strategic deployment, adoption, and long-term management of next-generation defense platforms across New England.

His nearly decade-long tenure in the industry has provided expertise across critical security domains, including Endpoint Detection and Response, Managed Detection and Response, Advanced SOC capabilities, Identity Protection, Incident Response, and Anti-Fraud solutions.

Currently serving as an Enterprise Account Executive at SentinelOne, he has spent the rest of his career at RSA Security/Dell, Crowdstrike, and AbnormalAI.

AI vs AI

  • This session explores the rapidly evolving landscape of cybersecurity, focusing on the dual role of Artificial Intelligence and Large Language Models as both a powerful weapon for adversaries and a crucial defensive tool for security teams. Organizations continue to face challenges in tool complexity, endless data feeds, and alert fatigue. For attackers,  Generative AI lowers the barrier to entry for creating advanced persistent threats, including social engineering campaigns, optimized payload crafting, and new types of polymorphic malware. Conversely, security teams are able to leverage AI for defense. Defensive strategies involve intelligent automation, such as using LLMs for guided threat hunting, automatic alert triage, incident summarization, and generating adaptive responses. Ultimately, the future of security lies in developing an "Autonomous SOC" through holistic, AI-assisted workflows that augment human analysts, prioritize critical defenses, and employ wide-area, precision approaches to combat AI-led attacks. 

Kevin Davis


Tines

 

From Automation to Intelligence – Building the Future of Enterprise Efficiency
  • A Enterprises have automated more than ever—yet teams are still overwhelmed, complexity is rising, and risk is increasing. The next leap isn’t more automation, but intelligent workflows that combine automation, AI, and human judgment.
    In this executive session, Kevin Davis, Director of Solutions Engineering at Tines, introduces a practical framework for evolving from deterministic workflows to intelligent, adaptive operations. Through real-world examples and interactive discussion, attendees will learn how to balance automation for the known, AI for the unknown, and humans for the uncertain. The result: smarter decisions, stronger resilience, and enterprise efficiency at scale

Mic McCully

Oligo

Mic McCully is Field CTO at Oligo Security, where he helps customers and partners leverage Oligo’s platform to solve pressing security challenges. Previously, he served as Field CTO at Snyk and held senior positions at organizations like Symantec and IBM. With over two decades in security, Mic has guided some of the world’s largest organizations in advancing application, network, data, and mobile security initiatives. His diverse experience gives him a unique perspective on how modern security programs are structured, and where critical gaps remain

 

Reinventing Runtime Security for the Cloud & AI Era
  • As attacks evolve across applications, cloud workloads, and AI systems, security tools remain fragmented and reactive. Oligo delivers a unified runtime protection platform that sees what’s truly running, detects real exploits instantly, and stops attacks in real time, without stopping your business.
    During this session, you will learn:
    Why runtime has become the new frontline for protecting cloud, application, and AI systems.
    How Oligo’s Deep Application Inspection (DAI) uniquely detects and stops exploits as they execute.
    How organizations unify AppSec, CloudSec, and AI defense to cut 90% of noise, shrink response time to seconds, and consolidate overlapping tools, all while maintaining uptime and business velocity.

Kyle Hicks

 Sayers

Tyler Tomlinson is a cybersecurity professional with many years of experience delivering technology solutions across   Zero Trust at the Endpointdiverse industries. Holding a degree in Computer and Information Systems Security, he specializes in helping enterprises strengthen their security posture through Zero Trust and least privilege strategies. Tyler focuses on making complex product information clear, relevant, and actionable to address real-world gaps and use cases.    

Sayers Microsoft CSP
  • Kyle will be discussing how Sayers has built their Microsoft CSP practice, how they are different from other CSP's and how it is helping their customers secure their environments.

Our Sponsors