13 Expert Takeaways From Sagetap's Virtual Panel of Security Executives
Explore key insights from Sagetap’s private virtual panel, where three accomplished cybersecurity leaders from the Sage community shared how they’re navigating 2025’s biggest challenges.
August 25, 2025
On August 21, Sagetap hosted a private virtual cybersecurity panel featuring three accomplished security executives from our community:
- Matthew Mudry, CISO at Alera Group, Inc.
- Ian Schneller, Cybersecurity Advisor and Former CISO at Health Care Service Corporation (HCSC)
- Rick Doten, Cybersecurity VC & Startup Advisor and Former Healthplan CISO at Centene Corporation
Over the course of an hour, the panelists dug into the most urgent challenges facing enterprise security leaders today, from budget pressure and evolving threats, to the realities of adopting AI, to how leaders are navigating a noisy vendor ecosystem. Moderated by Evan Tarver, Sagetap’s Head of Growth, the discussion was candid, peer-led, and practical, designed to highlight what security executives should be focused on in 2025.
Want to keep learning? Watch the full replay below — available exclusively through Sagetap — and join our community to evaluate technology with peer insights from executives like Mudry, Schneller, and Doten.
What’s Most Pressing for Security Leaders in 2025
The conversation began with the biggest questions on every leader’s mind: where to focus in the year ahead, and how to make progress in a challenging environment. The panelists shared practical lessons from their own roles and what they’re seeing across the industry.
- First 100 days shape long-term influence: Building relationships, assessing talent, and securing quick wins early on set the foundation for credibility. The panelists stressed that without early trust, it’s far harder to gain buy-in for long-term initiatives later.
- Macroeconomic pressure is hitting security: With budgets shrinking, leaders are being forced to justify expensive flagship tools and explore leaner alternatives. The challenge is balancing cost savings with maintaining resilience against increasingly sophisticated threats.
- Threat actors are evolving: Identity exploitation, zero-day weaponization, and attacks on edge devices are all on the rise. The leaders agreed that traditional defenses can’t keep up, and that faster detection and containment strategies are becoming essential.
- Business alignment is non-negotiable: Security leaders must tie every dollar of spend to strategic objectives. Speaking in business terms, showing measurable impact, and maintaining governance forums are now prerequisites for executive support.
.png)
How AI Is Transforming Security Programs
The three panelists acknowledged both the promise and the pitfalls of weaving AI into security programs, and agreed that its impact will depend heavily on governance and practical application.
- AI maturity isn’t uniform: Some companies are just rolling out basic usage policies, while others are embedding AI into security workflows and development pipelines. The spectrum is wide, but maturity depends heavily on business context and resources.
- Without governance, AI creates risk overnight: Shadow AI adoption can lead to compliance failures and data exposure fast. The panelists said steering committees (blending security, legal, HR, and data teams) are proving to be one of the most effective safeguards.
- Vendors need scrutiny: The leaders urged panel attendees to dig deeper into how models are trained, secured, and audited. Black-box systems may work for a while, but regulators and auditors are already demanding more transparency from security vendors.
- Real value lies in remediation: AI is most impactful when it reduces analyst workload by prioritizing risks and automating containment. Detection is table stakes — what matters is how AI helps teams act faster without adding headcount.
- Data loss prevention could finally advance: DLP has been stagnant for years, but AI-driven monitoring of user behavior may finally make it dynamic. Instead of endless rule maintenance, leaders see the potential for adaptive policies that actually prevent risky behavior.

How Top Security Leaders Evaluate Vendors in 2025
The final segment focused on vendor discovery, a shared frustration for most CISOs and security executives. Panelists discussed why the traditional approach to vendor outreach is broken and how they’re rethinking the evaluation process.
- Cold outreach is unmanageable: The panelists' inboxes are flooded daily with sales pitches. If cybersecurity executives accepted every request, they’d spend all day on calls, making traditional outreach unscalable and often counterproductive.
- CISOs don’t have time for vague pitches: Vendors must explain in plain language what problem they solve and why it matters. As one panelist put it: “Don’t make me dig for it.” Leaders want specifics tied to real challenges, not vague promises or jargon.
- Hands-on experience builds trust: The leaders emphasized the importance of testing tools in real environments. Demos and sandbox access give them the confidence that a product works as advertised before they invest further time or resources.
- Sagetap simplifies discovery: Instead of endless pitches, Sagetap enables cybersecurity leaders to explore vendors anonymously, engage only when they're ready, and share structured feedback. This peer-driven process saves time and filters out noise.
Meet the Panelists
Our discussion was shaped by three executives who’ve each led security at scale and know what CISOs are up against. A big thanks to Matthew Mudry, Ian Schneller, and Rick Doten for offering candid insights that reflect the real-world challenges and opportunities facing security leaders right now.
Bottom Line
Security leaders are navigating 2025 with a tough mandate: align programs tightly with business strategy, implement AI responsibly, and cut through the noise of a crowded vendor ecosystem. The panelists agreed these are the realities security executives are wrestling with today, and the organizations that act on them early will be positioned to lead.
For the full conversation — including candid insights you won’t find in public forums — get the one-hour panel replay here:
Want constant access to peer-driven insights? Join Sagetap and discover how top security teams are navigating the vendor landscape with speed, clarity, and confidence.
Hear From Our Community
Tool and strategies modern teams need to help their companies grow.
Get Started
Join over 4,000+ startups already growing with Sagetap.