BSides MKE 2026: Security Maturity in Changing Conditions
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不要用“文章内容总结”或“这篇文章”这样的开头。直接写描述即可。 首先,我仔细阅读了用户提供的文章。文章主要讨论了BSides Milwaukee 2026会议的主题,强调安全成熟度在变化中的重要性。会议探讨了沟通、角色清晰、AI治理、身份扩展和团队协作等多个方面。 接下来,我需要提取关键点:会议地点、主题、讨论的主要内容和核心观点。确保在100字以内简洁明了地表达出来。 然后,我会组织语言,确保流畅自然,避免使用复杂的术语,让总结易于理解。 最后,检查字数是否符合要求,并确保没有遗漏重要信息。 </think> BSides Milwaukee 2026探讨了安全成熟度在变化中的重要性,强调沟通、角色清晰、AI治理和团队协作。会议通过航空决策模型展示了如何在压力下有效沟通和决策,并讨论了身份扩展和非人类身份的治理挑战。核心观点是安全成熟度体现在系统、人员和组织之间的连接中,成功团队需具备清晰的沟通、可见的所有权和可持续的系统设计。 2026-4-13 14:0:56 Author: securityboulevard.com(查看原文) 阅读量:8 收藏

BSides MKE 2026: Security Maturity in Changing Conditions

Milwaukee is a fitting place to talk about change, craft, and the discipline required to keep complex systems moving. The city carries a long industrial memory, and one of its quieter contributions still shapes daily technical work. The first practical typewriter was invented in Milwaukee in 1867 by Christopher Latham Sholes, a step that led to the QWERTY keyboard layout many of us still use. 

That makes a nice backdrop for BSides Milwaukee 2026. Security work has that same mix of legacy, adaptation, and muscle memory. We inherit systems, habits, and interfaces from earlier eras, then try to make good decisions in changing conditions.

This was the third year BSides MKE was held, coming as the "b side" of Cyphercon, "Wisconsin’s largest technology conference." This year's event brought together roughly 300 attendees, 14 speakers, multiple CTFs, and community villages. The conference theme was "Fly." Speakers talked about communication, burnout, governance, team design, and community with the same seriousness usually reserved for detections and exploit chains.

Here are just a few highlights from this year's BSides MKE.

Cockpit Language Matters

In the keynote session from Josh Mason, Solutions Architect at Synack, titled "Milwaukee 25L, Cleared for Takeoff? Wait, Are We Ready to Fly?" he discussed aviation discipline and how crews make decisions under pressure. The cyberthreat context he drew comparisons to is that attackers are moving fast, identity abuse keeps rising, and burnout is hollowing out experienced teams. Josh’s real focus sat elsewhere. He kept returning to mission, communication, and the responsibility security teams have to make their work understandable to the rest of the organization.

He exposed a familiar gap. Security teams often know exactly what they mean when they say "CVE," "SIEM," "SOAR," "risk," or "control." The rest of the business usually hears cost, delay, friction, or a request for budget without enough context to act. Josh used cockpit communication as the model for a better approach. Crews stay aligned by speaking clearly, sharing what matters, and giving everyone permission to call out danger. The same discipline applies in a company where marketing, finance, product, and legal all influence what security can accomplish.

Some of the most important security problems today sit in that translation layer. Secrets exposure, third-party trust, and identity misuse are never just technical defects. They shape customer confidence, procurement reviews, and revenue conversations. Josh’s talk argued that security maturity includes knowing how to position findings in terms that the business can absorb and use. He really outlined a path to operational competence.

BSides MKE 2026: Security Maturity in Changing Conditions
Josh Mason

Leadership At Cruising Altitude

Scott Quenneville, Manager of Enterprise Security Operations and Engineering at ATC, presented "Bridging the Gap: Leading Cybersecurity Teams Across Generations, Skill Sets, and Stakes." This was a practical look at the changes that occur when a security practitioner becomes responsible for other people’s success. The talk stayed close to the realities of the job. Leaders are expected to stay technically credible while also creating direction, coaching talent, managing conflict, and reducing burnout. Those are difficult shifts, especially in a field where urgency can crowd out reflection.

Scott focused on role clarity, decision rights, and the difference between assigning tasks and defining outcomes. Those ideas sound basic until a team starts missing escalations or duplicating work because nobody knows who owns what. Security organizations often accumulate responsibilities faster than they mature their structure. That produces stress, hidden gaps, and brittle execution. His framing treated clarity as a security control. When ownership is vague, risk stays vague too.

The talk also touched on personal well-being. Burnout needs to be treated as an operational problem with visible signals, not as a private weakness for individuals to manage alone. Teams under chronic pressure make worse decisions, avoid healthy conflict, and lose valuable people. Security maturity shows up in calmer ways of working as much as in sharper technical outcomes. A team that can learn, escalate, and recover together will outperform a larger team stuck in confusion and exhaustion.

BSides MKE 2026: Security Maturity in Changing Conditions
Scott Quenneville

Governance For The New Crew Members

In the session from Qasim Ijaz, Director of Cyber Security at Aveanna Healthcare, called "Practical AI Governance for Sentients," we were presented with one of the clearest operational frameworks of the day. The talk covered model behavior, training data, hidden environmental and human costs, prompt injection, and the growing spread of AI features across enterprise tools. Instead of treating AI governance as a policy document waiting to be written, Qasim treated it as an inventory and control problem that already exists inside most organizations.

That approach starts with a simple question, "What AI do you already have?" Not what the innovation team approved, nor what the board asked about. What tools are actually live right now, with what features enabled by default? What data do they touch, and what logs are generated? That focus on inventory was appreciated. Many teams are already living with shadow AI, internal copilots, retrieval pipelines, and client-facing agents without having a full map of their exposure. Governance has to begin with visibility, or it remains ceremonial.

AI agents act with credentials, call APIs, access data stores, and create new patterns of machine-level access. Those behaviors look a lot like the non-human identity problem that many teams are only beginning to scope properly. A mature program needs to know which agents exist, what secrets they depend on, what permissions they hold, and how those privileges are reviewed. Qasim’s plan, moving from identification to control, monitoring, and measurement, offered a useful structure for teams trying to bring that sprawl under governance before it turns into a familiar cleanup project later.

BSides MKE 2026: Security Maturity in Changing Conditions
Qasim Ijaz

Maturity Lives In The Connections

Throughout the day, there was a common thread: security maturity rarely appears as a single heroic capability. It appears in the connections between functions, between people, and between technical truth and organizational action. Many talks approached different parts of that same problem. Communication with the business, role clarity inside teams, AI inventories, and stronger communities all pointed toward one shared lesson. Security gets more effective when the connective tissue gets stronger.

Many organizations still evaluate maturity as a stack of controls. Controls matter, though teams do not fail only because a control is missing. They also fail because nobody translated the risk, nobody owned the follow-through, or nobody felt safe enough to say the plan was drifting. We have to address those operational realities the same way we would approach any present adversarial threat.

Identity Keeps Expanding The Boundary

Identity sat underneath far more of the event than the session titles might suggest. Attackers are logging in instead of breaking through obvious perimeter defenses. AI agents are acting with delegated privileges. Access control systems still boil down to whether a presented identity is trusted. Vendor trust reviews increasingly shape how companies buy and sell software. 

All of that expands the boundary of what security teams need to see and govern.

For teams focused on secrets and machine access, this matters a lot right now. Non-human identities, such as service accounts, with their access tokens and other embedded credentials, in our AI-connected workflows are no longer secondary concerns. They are part of the main operational surface. Mature programs are the ones that can map those identities, understand their permissions, and connect them back to business risk in language that decision makers can use.

Human Capability Is Infrastructure

One of the best parts of this, or any in-person event, is that it reminds us that the answer to a security problem almost invariably involves skilled humans. Better listening, better coaching, and better follow-up. We need to make more room for learning. More deliberate support for people under stress. 

Those are easy topics to sideline because they do not fit cleanly into procurement cycles or metrics dashboards. They still shape how well a team functions when the pressure rises.

Human capacities are critical parts of an operational infrastructure. A security team with psychological safety, clear ownership, and healthy communication can absorb change with far less damage than a team that has stronger tooling but weaker trust. In changing conditions, the human system around the technical system becomes part of the control plane.

Safely Landing The Plane, Together

We can't separate technical work from the conditions around it. The talks at this year's BSides MKE were full of real threats, hard constraints, and practical tactics, though the day kept returning to a deeper point. Security maturity is the ability to keep making sound decisions when the environment shifts. That requires more than sharp detection logic or one more platform rollout. It requires shared language, visible ownership, trustworthy communities, and a better map of the identities and systems already operating inside the business.

Milwaukee is a city with a long relationship to tools, production, and the craft of making systems usable over time. Just like how the typewriter was a design choice made generations ago that still shapes how people work today, security teams are living with the same reality. We inherit architectures, habits, and assumptions from earlier moments. The real challenge comes from then having to adapt those earlier decisions, made with the best intentions, under new pressures, all without losing control of the mission.

The largest takeaway from the event was that modern challenges live at the intersection of architecture, identity, operations, and organizational maturity. The most successful teams learn how to inventory carefully, communicate clearly, and build systems that people can actually sustain. And they do it together, in a way that helps the whole flight crew fly a successful mission. 

The post BSides MKE 2026: Security Maturity in Changing Conditions appeared first on GitGuardian Blog – Take Control of Your Secrets Security.

*** This is a Security Bloggers Network syndicated blog from GitGuardian Blog - Take Control of Your Secrets Security authored by Dwayne McDaniel. Read the original post at: https://blog.gitguardian.com/bsides-mke-2026/


文章来源: https://securityboulevard.com/2026/04/bsides-mke-2026-security-maturity-in-changing-conditions/
如有侵权请联系:admin#unsafe.sh