
December 2025 Meeting
Join us at our
Annual Membership Meeting & Sponsor Showcase
December 9th, 2025, 9:00 AM - 3:00 PM
@
Cost: Free to all ISSA NE Members
What's In Store?
What to Expect:
Breakfast & lunch
Networking opportunities
Solution Showcases
Updates on the Chapter
Bylaw discussion
Space is limited! Secure your spot today and join us!
ISSA Members: Free registration
Non-Members: Learn about our membership benefits - General membership starting at $95/year
Agenda
9:00 AM - 9:45 AM BREAKFAST & REGISTRATION
Light breakfast, coffee, and networking
9:45 AM - 10:00 AM WELCOME & OPENING REMARKS
Cailin Sullivan, President, ISSA NE Board of Directors
10:00 AM - 10:30 AM PLATINUM SPONSOR PRESENTATION: THREATLOCKER
Tyler Tomlinson, ThreatLocker
Zero Trust at the Endpoint
10:30 AM - 10:45 AM NETWORKING BREAK
Connect with peers and visit solution showcases
10:45 AM - 11:15 AM ISSA NE SESSION: DAN BAILEY
Dan Bailey, VP Board of Directors, ISSA NE
This is Not a Place of Honor: Lessons in Risk Communication From the Nuclear Industry
11:15 AM - 11:30 AM GOLD SPONSOR PRESENTATION: TINES
Kevin Davis, Director of Solutions Engineering, Tines
From Automation to Intelligence - Building the Future of Enterprise Efficiency
11:30 AM - 12:30 PM LUNCH
Networking opportunities and solution showcase visits
12:30 PM - 12:45 PM GOLD SPONSOR PRESENTATION: CORELIGHT
Lev Nakhlis, Corelight
EDR Evasion: Defending against attacks that evade traditional detections
12:45 PM - 1:30 PM PLATINUM SPONSOR PRESENTATION: OLIGO
Mic McCully, Field CTO, Oligo Security
Reinventing Runtime Security for the Cloud & AI Era
1:30 PM - 1:40 PM SHORT BREAK
1:40 PM - 2:10 PM PLATINUM SPONSOR PRESENTATION: SENTINELONE
Kevin Kieda, Enterprise Account Executive, SentinelOne
AI vs AI: The Future of Cybersecurity Defense
2:10 PM - 2:25 PM GOLD SPONSOR PRESENTATION: SAYERS
Kyle Hicks, Sayers
Sayers Microsoft CSP Practice: Securing Customer Environments
2:25 PM - 2:40 PM GOLD SPONSOR PRESENTATION: ARCTIC WOLF
Steve Sullivan, Account Executive, Arctic Wolf
Security Operations, what's the Risk of not investing?
2:40 PM - 2:55 PM CHAPTER UPDATE & BYLAW DISCUSSION
- Chapter business updates
- Bylaw discussion
- Membership initiatives
- Discord channel introduction
2:55 PM - 3:25 PM ISSA NE SESSION: JACK BUTLER
Jack Butler, Associate Director, ISSA NE
Application Security and OWASP Best Practices
3:25 PM - 3:30 PM CLOSING REMARKS & THANK YOU
Recognition of sponsors and members
3:30 PM - 4:00 PM NETWORKING & SOLUTION SHOWCASES
Continue conversations, visit sponsor booths, and connect with peers
Meet our Speakers
Dan Bailey
VP, Board of Directors @ ISSA NE
Dan brings 25 years' infosec experience, a Ph.D. in Computer Science, and more than 55 US patents issued. He specializes in application security, especially around authentication and authorization.
This is Not a Place of Honor: Lessons in Risk Communication From the Nuclear Industry
- Communication about risk with non-technical stakeholders including business leadership is difficult. Information security professionals can learn a lot from other industries. As a case study, we will examine lessons learned from the nuclear industry, communicating about risks to the general public.
Jack Butler
Associate Director @ ISSA NE
Jack Butler is a Senior Solutions Engineer at Sumo Logic, specializing in logging, SIEM, and application security. He helps organizations modernize security operations, streamline data integration, and strengthen resilience against evolving threats. Jack also serves as an OWASP Boston chapter leader, helping advance security education, promote secure-by-design principles, and drive collaboration within the local community.
Tyler Tomlinson
Threatlocker
Tyler Tomlinson is a cybersecurity professional with many years of experience delivering technology solutions across Zero Trust at the Endpointdiverse industries. Holding a degree in Computer and Information Systems Security, he specializes in helping enterprises strengthen their security posture through Zero Trust and least privilege strategies. Tyler focuses on making complex product information clear, relevant, and actionable to address real-world gaps and use cases.
Lev Nakhlis
Corelight
In a previous life, Lev was a Network Infrastructure Architect for a company in bankruptcy. With zero budget and a lean team, he couldn't buy security—he had to build it. Lev relied on creativity and open-source tools like Zeek (Bro) and Suricata to maintain visibility while migrating critical infrastructure from Rackspace to AWS, ensuring the lights stayed on even when resources were scarce.
That experience taught him that you can't secure what you can't see. After spending time at Rapid7 helping organizations solve broad security challenges—from AppSec and VM to XDR—Lev returned to his network roots. Now at Corelight, he helps defenders shine a light on the dark corners of the network where attackers love to hide and traverse—providing the deep visibility he once had to build by hand, only now it’s turn-key.
EDR Evasion: Defending against attacks that evade traditional detections
- EDR Evasion is a growing trend amongst sophisticated threat actors looking to bypass traditional cybersecurity capabilities. This talk will explore the rise of EDR evasion and how NDR is uniquely equipped to enable organizations to detect these threats.
Kevin Kieda
SentinelOne
Kevin is a highly experienced cybersecurity professional specializing in the strategic deployment, adoption, and long-term management of next-generation defense platforms across New England.
His nearly decade-long tenure in the industry has provided expertise across critical security domains, including Endpoint Detection and Response, Managed Detection and Response, Advanced SOC capabilities, Identity Protection, Incident Response, and Anti-Fraud solutions.
Currently serving as an Enterprise Account Executive at SentinelOne, he has spent the rest of his career at RSA Security/Dell, Crowdstrike, and AbnormalAI.
AI vs AI
- This session explores the rapidly evolving landscape of cybersecurity, focusing on the dual role of Artificial Intelligence and Large Language Models as both a powerful weapon for adversaries and a crucial defensive tool for security teams. Organizations continue to face challenges in tool complexity, endless data feeds, and alert fatigue. For attackers, Generative AI lowers the barrier to entry for creating advanced persistent threats, including social engineering campaigns, optimized payload crafting, and new types of polymorphic malware. Conversely, security teams are able to leverage AI for defense. Defensive strategies involve intelligent automation, such as using LLMs for guided threat hunting, automatic alert triage, incident summarization, and generating adaptive responses. Ultimately, the future of security lies in developing an "Autonomous SOC" through holistic, AI-assisted workflows that augment human analysts, prioritize critical defenses, and employ wide-area, precision approaches to combat AI-led attacks.
Kevin Davis
Tines
From Automation to Intelligence – Building the Future of Enterprise Efficiency
- A Enterprises have automated more than ever—yet teams are still overwhelmed, complexity is rising, and risk is increasing. The next leap isn’t more automation, but intelligent workflows that combine automation, AI, and human judgment.
In this executive session, Kevin Davis, Director of Solutions Engineering at Tines, introduces a practical framework for evolving from deterministic workflows to intelligent, adaptive operations. Through real-world examples and interactive discussion, attendees will learn how to balance automation for the known, AI for the unknown, and humans for the uncertain. The result: smarter decisions, stronger resilience, and enterprise efficiency at scale
Mic McCully
Oligo
Mic McCully is Field CTO at Oligo Security, where he helps customers and partners leverage Oligo’s platform to solve pressing security challenges. Previously, he served as Field CTO at Snyk and held senior positions at organizations like Symantec and IBM. With over two decades in security, Mic has guided some of the world’s largest organizations in advancing application, network, data, and mobile security initiatives. His diverse experience gives him a unique perspective on how modern security programs are structured, and where critical gaps remain
Reinventing Runtime Security for the Cloud & AI Era
- As attacks evolve across applications, cloud workloads, and AI systems, security tools remain fragmented and reactive. Oligo delivers a unified runtime protection platform that sees what’s truly running, detects real exploits instantly, and stops attacks in real time, without stopping your business.
During this session, you will learn:
Why runtime has become the new frontline for protecting cloud, application, and AI systems.
How Oligo’s Deep Application Inspection (DAI) uniquely detects and stops exploits as they execute.
How organizations unify AppSec, CloudSec, and AI defense to cut 90% of noise, shrink response time to seconds, and consolidate overlapping tools, all while maintaining uptime and business velocity.
Kyle Hicks
Sayers
Tyler Tomlinson is a cybersecurity professional with many years of experience delivering technology solutions across Zero Trust at the Endpointdiverse industries. Holding a degree in Computer and Information Systems Security, he specializes in helping enterprises strengthen their security posture through Zero Trust and least privilege strategies. Tyler focuses on making complex product information clear, relevant, and actionable to address real-world gaps and use cases.
Sayers Microsoft CSP
- Kyle will be discussing how Sayers has built their Microsoft CSP practice, how they are different from other CSP's and how it is helping their customers secure their environments.
Steve Sullivan
Arctic Wolf
Steve Sullivan is an experienced Account Executive specializing in enterprise cybersecurity solutions at Arctic Wolf, a leader in security operations. With a proven track record of helping organizations strengthen their security posture, Steve partners with enterprises to deliver managed detection and response, vulnerability management, endpoint detection and response and risk mitigation strategies. His expertise lies in guiding businesses through the evolving threat landscape and aligning security initiatives with business objectives.
Steve brings a consultative approach to every engagement, leveraging Arctic Wolf’s industry-leading platform and concierge security team to provide tailored solutions that reduce risk and improve resilience. Passionate about cybersecurity education and collaboration, Steve regularly engages with IT leaders to share insights on best practices and emerging trends in security operations.
Security Operations, what's the Risk of not investing?
- Arctic Wolf is the market leader in Security Operations, delivering cloud-native, AI-driven cybersecurity through its Aurora Platform. By providing security operations as a concierge service, Arctic Wolf offers Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), Managed Risk, Managed Security Awareness, and Incident Response. Their team of expert analysts works as an extension of your internal IT teams to deliver 24/7 monitoring, rapid threat response, and proactive risk management—empowering organizations to achieve seamless protection and unmatched resilience.
Our Sponsors
