RSA Conference 2026:

Breakfast Panel & Security Leader Networking

 

Governing AI-Native Development

Strategic Imperatives for Security Leaders

 

AI-coding has fundamentally altered the economics and risk profile of software development. Security leaders face a strategic inflection point: how do you enable AI-accelerated innovation while managing an evolving threat landscape that boards, regulators and auditors are only beginning to understand? 

 

This executive breakfast convenes security leaders and a top-notch panel to address the governance, operational and organizational challenges of securing AI-native development at enterprise scale.

 

Panelists:

Details:

Date: Tuesday, March 24th

Time: 7:30 - 10:00AM PST

Location: The Conservatory at One Sansome in San Francisco, CA

 

Topics we'll cover include

  • Redefining risk ownership: Where does accountability lie when AI generates critical code? How do you articulate this to the Board and business leaders?
  • Resource reallocation: Should you invest in AI security controls, upskill existing teams or fundamentally restructure AppSec? What's the ROI calculus?
  • Regulatory readiness: With AI transparency requirements emerging globally, how do you demonstrate due diligence in code provenance, licensing compliance and security validation?
  • Measuring security effectiveness: Traditional MTTR and vulnerability counts don't capture AI-specific risks. What metrics matter to executive stakeholders?
  • Competitive dynamics: Are you falling behind peers who've embraced AI development or are they accumulating hidden security debt? How do you benchmark responsibly?
  • Organizational transformation: How do you evolve team structures, incentives, and culture when AI fundamentally changes what "secure development" means?

Join peers navigating the shift from tactical AI adoption to strategic AI governance - where decisions today shape your organization's security posture and competitive position for the next decade.


Request a seat - space is limited! 

Request a Seat:

 

“Legit is providing us with visibility across the entire software supply chain, which helps us minimize risk and raise analyst and engineering productivity”

testimonial-logo
Deputy Chief Information Security Officer
Netscope

“Legit significantly helps organizations to modernize application security programs by seamlessly integrating security into agile development and our modern application stack."

cboe-testimonial
Global CISO
Chicago Board of Options Exchange (CBOE)

“Legit helps us secure our CI/CD pipelines including tracking the security posture of different teams, addressing SDLC configuration drifts, and applying security resources where it can help us most."

acv-testimonial
VP of Security
ACV Auctions

"We’re able to inventory all our SDLC systems and security tools, view developer activity, and leverage this visibility and context to remediate vulnerabilities faster."

takeda-testimonial
Head of DevSecOps
Takeda Pharmaceutical Company

“Legit gives us governance out of the box, and the ability to have visualization across our SDLC to improve our developer collaboration and security best practices.”

google-mandient-testimonial
Chief Information Security Officer
Google/Mandiant

Value Delivered Fast

Onboard in Minutes

No agents to install. Securely leverages APIs and access tokens

One Platform, All Resources

SaaS, private cloud and on-premise
deployment options

Your Tools and Workflows

No changes required to any of them

Book a free consultation today. You’ll see how Legit can:
  • Find everything impacting your AppSec posture through a unified view of all application risk – from code to cloud.
  • Fix the issues that create the most business risk with deep context to prioritize and action remediation.
  • Prevent future risk by automating the time-intensive, manual processes associated with triage and remediation.
In addition, as you build your AppSec program, we can help you:
  • Map and visualize your entire software supply chain.
  • Optimize your vulnerability management processes.
  • Align your program with key compliance standards and frameworks.
  • Implement advanced secrets detection and prevention.
  • Identify use of GenAI in your development.