Leslie Sakal
Dallas, Texas, United States
3K followers
500+ connections
View mutual connections with Leslie
Leslie can introduce you to 10+ people at BD Emerson
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Leslie
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
I help connect companies that want to build meaningful cybersecurity programs with the…
Articles by Leslie
-
Great Decisions: 4 Steps to Improve Decision-Making and 4 Ways to Increase Decision-Making Quality
Great Decisions: 4 Steps to Improve Decision-Making and 4 Ways to Increase Decision-Making Quality
Steps to Improve Decision Making: Research indicates that having diverse group members with different backgrounds and…
12
-
Facilitating Hands-On in a Virtual Learning EnvironmentMar 17, 2020
Facilitating Hands-On in a Virtual Learning Environment
Last week I was in a classroom discussing some strategies with a teacher about how to allow their Clinical Rotation…
7
1 Comment
Activity
3K followers
-
Leslie Sakal shared thisOne pattern I keep seeing across calls is that companies are deploying AI tools and agents fast… and governance conversations happen after the fact (usually triggered by a customer audit request or a near-miss). We’ve seen it with ISO 42001 inquiries, AI acceptable use policies, even penetration testing of AI guardrails. Excited to see Drew Danner, CISSP, PMP joining the effort with AIUC-1!Leslie Sakal shared thisProud to join the Artificial Intelligence Underwriting Company as a Consortium Member supporting AIUC-1, the first AI agent standard for security, safety, and reliability. Here's why this matters. AI agents are scaling faster than anything I've worked with in my career. Trillions of autonomous agents inside the next two years, and no shared guardrails to speak of. We've seen this story before. When software emerged, we didn't make security a design priority. We didn't hold manufacturers accountable for shipping defective code. The result was predictable: fragile infrastructure, mass exploitation, and a trillion-dollar ransomware economy we're still paying down today. AIUC was founded by Rajiv Dattani and Rune Kvist to certify and insure AI agents so enterprises can actually adopt them. AIUC-1 sets measurable standards across identity, authorization, observability, data protection, and accountable AI behavior. Before agents become the connective tissue of every business process, every device, every sector. Not after the damage is done. This is exactly why our Risk & Resiliency practice at Andersen Consulting is leaning in. We help clients adopt new technology without becoming the cautionary tale. Companies are already deploying agents across customer service, legal review, finance, and engineering. They need a credible way to evaluate risk, hold vendors accountable, and prove to their own boards and regulators that the controls hold up. AIUC-1 gives them that. This isn't about slowing innovation. It's about making sure innovation doesn't undermine the trust our economies depend on. Embed safety at the platform layer instead of scattering it across apps. Put accountability on vendors instead of leaving end users to navigate the risk alone.
-
Leslie Sakal reposted thisLeslie Sakal reposted this🚀 Hiring: Palantir Foundry / Forward Deployed Engineer (Data + AI) This isn’t a “build dashboards and move on” role. You’ll sit with users, understand real decisions, and build systems that get used across data pipelines, Ontology models, and AI-powered workflows. What you’ll do: ✅ Own end-to-end data pipelines (not just pieces) ✅ Build applications operators rely on ✅ Work on real-world AI / agent workflows (not just talk about them) ✅ Partner directly with stakeholders to solve messy, ambiguous problems 💰 Competitive comp If you like building things that actually matter—let’s talk! APPLY HERE 👇Manager - Foundry/AIP Forward Deployed Engineer in Chicago, Illinois | AndersenManager - Foundry/AIP Forward Deployed Engineer in Chicago, Illinois | Andersen
-
Leslie Sakal shared thisHad a great time as always getting some court time with our community! We had a great turnout with a lot of new faces. I want to give a special shoutout to Brendon McCaulley who helped me sponsor the event. Brendon is our NTX ISSA President and has attended almost every event! Even though he forgot his pickleball clothes at home, I saw him sneak some games in. Dedication!😉 We will be trying to bring you more pickleball events in the near future! Stay tuned.
-
Leslie Sakal reposted thisLeslie Sakal reposted thisIf your company is in the defense ecosystem or planning to pursue CMMC, this is worth paying attention to. Primes like Lockheed Martin, L3Harris, Northrop Grumman, and Raytheon are now requiring subcontractors to implement CMMC. Many teams outside of security and compliance aren’t tracking this closely, but they should be. This ties directly to revenue. I won’t speculate on any specific program, but the shift is clear: CMMC is moving from “upcoming requirement” to “condition of doing business.” CMMC is not SOC 2. The preparation is more technical, the audit is stricter, and certification is required, especially for teams handling CUI at Level 2. Most companies don’t feel this until a prime asks for proof. At that point, timelines compress fast. If you work with government primes, it’s worth assessing where you actually stand: - Is your environment fully implemented or partially documented? - Are controls operating or just defined? - Are you aligned for a real C3PAO assessment? - Programs built on speed, templates, or “quick prep” approaches will struggle here. Shallow programs are being tested. Rigorous ones are being required. This is the moment to build from first principles. No shortcuts.
-
Leslie Sakal reposted thisHi network! I need help finding a talented junior security support engineer for my team. Please put the word out for Dallas / New York hybrid! If you’re in ISSA, GDG, Dallas AI, or DHA I’m asking for your help! Sean Richards, CISSP James Anderson Dustin Dykes Thuy Nguyen Vijayram Vissapragada Evan L.
-
Leslie Sakal shared thisExcellent paper from Amanda Weeks (Lynch) --Life and Annuity carriers are seeing record demand for retirement income products. In the U.S., annuity sales have almost doubled since 2020, hitting $434 billion last year. That growth looks strong on the surface, but underneath, many carriers are still running on legacy infrastructure. Process gaps and cost issues are getting covered up by volume. Margin pressure has not disappeared (It is just being diluted by demand). That works while the market is hot. The risk shows up when demand levels off, and what feels like growth can quickly turn into a margin problem. This cycle is exposing the difference between adding volume and truly scaling. In Andersen Consulting’s latest paper, linked below, we break down: • The operational friction points slowing carriers down • Why linear growth models break under pressure • How to build repeatable capabilities that compound over time • Where AI fits as a deliberate business lever, not just a tech upgrade The focus is simple: convert today’s demand into long term, profitable performance. https://lnkd.in/e2JDYAXdHow Business-Driven AI Unlocks Profitable, Scalable Growth in Life and AnnuityHow Business-Driven AI Unlocks Profitable, Scalable Growth in Life and Annuity
-
Leslie Sakal reposted thisLeslie Sakal reposted thisWe’re hiring in Boca Raton. Penti.ai is looking for a full-cycle Business Development professional to own the sales process from inbound leads through closing and partner growth. This is an onsite role for someone who understands B2B sales, communicates business value clearly, and thrives in a fast-moving environment. Compensation includes base + commission. Equity upside available based on performance and milestones. What you’ll do: • Manage inbound pipeline in HubSpot • Run discovery calls and demos • Close deals and expand accounts • Support channel partnerships Experience in SaaS or cybersecurity is a plus. If someone great comes to mind, I’d appreciate the intro. DM me. 📍 HQ at Research Park at Florida Atlantic University
-
Leslie Sakal reposted thisLeslie Sakal reposted thisThe new year, the new BD Emerson. For the past few months we’ve been deep in the process of rethinking our brand presence. What we’re revealing today is the result of this exciting collective effort in partnership with Foursets - Webflow Premium Partner, our long-term collaborator. A new logo, a refreshed visual identity, and a new website – this evolution reflects how far we’ve come and where we’re headed as a mature global consultancy. What has changed is how clearly our identity now mirrors the work we do every day, designed for leaders making high-stakes decisions. What hasn’t changed is our commitment to practical, senior-led advisory. BD Emerson’s work has always lived at the intersection of audit, risk, privacy, and technology consulting. Our new identity reflects this complex role in helping leadership teams navigate risk with clarity and confidence. If the new brand comes across as intelligent, professional, trustworthy, and innovative, our mission with it is accomplished. “Our new brand reflects how we think about risk today – as something to be governed thoughtfully, communicated clearly, and managed with confidence at the leadership level.” – Drew Danner, CISSP, PMP, Managing Director, BD Emerson We invite you to explore the new bdemerson.com, learn more about our services, and continue the conversations that move organizations forward. Thank you to our incredible team, clients, and partners for being part of this journey. Let us know what you think! We’re very excited about this new chapter and welcome your feedback.
-
Leslie Sakal liked thisLeslie Sakal liked thisProud to join the Artificial Intelligence Underwriting Company as a Consortium Member supporting AIUC-1, the first AI agent standard for security, safety, and reliability. Here's why this matters. AI agents are scaling faster than anything I've worked with in my career. Trillions of autonomous agents inside the next two years, and no shared guardrails to speak of. We've seen this story before. When software emerged, we didn't make security a design priority. We didn't hold manufacturers accountable for shipping defective code. The result was predictable: fragile infrastructure, mass exploitation, and a trillion-dollar ransomware economy we're still paying down today. AIUC was founded by Rajiv Dattani and Rune Kvist to certify and insure AI agents so enterprises can actually adopt them. AIUC-1 sets measurable standards across identity, authorization, observability, data protection, and accountable AI behavior. Before agents become the connective tissue of every business process, every device, every sector. Not after the damage is done. This is exactly why our Risk & Resiliency practice at Andersen Consulting is leaning in. We help clients adopt new technology without becoming the cautionary tale. Companies are already deploying agents across customer service, legal review, finance, and engineering. They need a credible way to evaluate risk, hold vendors accountable, and prove to their own boards and regulators that the controls hold up. AIUC-1 gives them that. This isn't about slowing innovation. It's about making sure innovation doesn't undermine the trust our economies depend on. Embed safety at the platform layer instead of scattering it across apps. Put accountability on vendors instead of leaving end users to navigate the risk alone.
-
Leslie Sakal reacted on thisLeslie Sakal reacted on thisBREAKING NEWS: EU leaders agree to amend the EU AI Act Just this morning, the EU announced it has reached a political agreement on the EU AI Act amendments. Although the law has not yet been formally amended, today's announcement is a clear signal that it is overwhelmingly likely to happen. There is a now a race against the clock to get the official regulation passed before the 2 August 2026 applicability date. Here are the key elements of the provisional agreement: ➡️ Delay of enforcement date for high-risk AI systems: from 2 August 2026 (in law today) to 2 December 2027 (for AI systems listed in Annex III) and 2 August 2028 (for AI systems covered by Annex I). These dates will be fixed, irrespective of the availability of standards and guidelines. ➡️ AI systems capable of generating non-consensual sexual and intimate content or CSAM added to the list of prohibited AI practices. ➡️ Registration in the EU's public database continues to be mandated for providers of "exempted" AI systems that are deemed to not be high-risk (due to a derogation)—but less information needs to be registered. ➡️ Postponement of enforcement date for generative AI output detection and watermarking obligation (stipulated in Article 50(2)) to 2 December 2026. ➡️ Broader scope for when organisations can lawfully process sensitive personal data for bias detection and correction—but it must still be "strictly necessary" and only to address specific types of biases. Although the timeline changes are headline grabbing, the core structure and logic of the AI Act remains broadly intact. Organisations should not use the delays as a reason to deprioritise. In certain areas (e.g., registration), some of the initial Commission simplification proposals have been curtailed by the European Parliament and Council. Interestingly, no information was provided on what was agreed regarding AI literacy—the Commission and Council originally wanted to remove or significantly lighten the obligation, but the Parliament disagreed. Please note that this summary is based on the official reports from the EU institutions. It is non-exhaustive as the full text of the political agreement is not (yet) available.
-
Leslie Sakal liked thisLeslie Sakal liked thisI've been building something during nights and weekends, and I think it's ready for people to try… It started with a pattern I noticed: smart, hardworking people getting passed over — not because their work wasn't good, but because they had a hard time proving it when it counted. Annual review season hits and suddenly everyone's in a scramble to remember what they did in January. 🤯 So I built Accolade. It's a personal career management app that lets you capture a work win in 20 seconds. The app will then turn your win into a résumé bullet, self-review, or promotion case. It’s private, owned by you (not your employer), and built to follow you across jobs. So now I'm looking for a small group of beta testers… do you: → Rarely remember to document your wins? → Want to manage your career more intentionally? → Wish your self-reviews or résumé bullets were stronger? → Have felt overlooked for work you're genuinely proud of? If any of that landed, I'd love to have you onboard as a beta tester. It's free, you’ll get full Pro access, and all I ask for in return is your feedback. → Join the waitlist at accolade.work, then keep an eye out for an email from team@accolade.work with instructions.
-
Leslie Sakal liked thisLeslie Sakal liked thisThough employing compliance automation tools is a no-brainer, they don’t create security maturity alone. While they can document controls, they can’t operationalize them, and that’s an important gap. We’ve worked with teams that had dashboards showing “compliant” controls, when, in actuality: • Access reviews weren’t actually happening • Incident response plans weren’t tested • Engineers didn’t follow documented processes • Vendors were approved without real risk evaluation Mature organizations do these things differently: • Controls are embedded into real workflows • Ownership is clearly defined across teams • Evidence is generated through operations, not screenshots • Security practices are understood by engineering, too Automation works best when it supports a program that already has foundational structure, accountability, and execution.This is how operational security is built. Follow BD Emerson to get more bite-sized POVs on security, risk, compliance, governance, and technology from our background of 15+ years consulting in the digital landscape.
-
Leslie Sakal reacted on thisWe just made FedRAMP®history! Schellman is the first 3PAO to assess 200 cloud service offerings on the Marketplace. Thank you to all of our clients for the trust you've put in us for supporting your journey entering and scaling in the federal market. This represents more than a decade of technical expertise, client trust, and assessment rigor. So proud of what this team has accomplished, and even more excited about where we're headed. #FedRAMP #CloudSecurity #SchellmanLeslie Sakal reacted on this200 FedRAMP® assessments. First 3PAO to reach this milestone. After more than a decade in the federal cloud security market, Schellman becomes the first Third Party Assessment Organization to assess 200 cloud service offerings on the FedRAMP Marketplace. This milestone spans every authorization level the program offers — Low, Moderate, High, and DoD impact levels IL4, IL5, and IL6. It represents cloud service providers of every size and type, from enterprise technology companies entering federal for the first time to defense primes operating in the government's most sensitive environments. Our clients have received 870+ ATOs across 71 federal agencies. That track record reflects the technical depth, program expertise, and assessment rigor that federal decision-makers and cloud providers count on. As FedRAMP modernizes through the 20x initiative, our independence and experience position us to help clients navigate what's next. Proud of this milestone and the team that made it possible. Check out the full announcement here: https://hubs.ly/Q04d_KTY0 #FedRAMP #CloudSecurity #FederalCompliance #Cybersecurity
-
Leslie Sakal liked thisShoutout to our Federal team for this milestone and all the great work they do for our clients! 👏Leslie Sakal liked this200 FedRAMP® assessments. First 3PAO to reach this milestone. After more than a decade in the federal cloud security market, Schellman becomes the first Third Party Assessment Organization to assess 200 cloud service offerings on the FedRAMP Marketplace. This milestone spans every authorization level the program offers — Low, Moderate, High, and DoD impact levels IL4, IL5, and IL6. It represents cloud service providers of every size and type, from enterprise technology companies entering federal for the first time to defense primes operating in the government's most sensitive environments. Our clients have received 870+ ATOs across 71 federal agencies. That track record reflects the technical depth, program expertise, and assessment rigor that federal decision-makers and cloud providers count on. As FedRAMP modernizes through the 20x initiative, our independence and experience position us to help clients navigate what's next. Proud of this milestone and the team that made it possible. Check out the full announcement here: https://hubs.ly/Q04d_KTY0 #FedRAMP #CloudSecurity #FederalCompliance #Cybersecurity
Experience
Volunteer Experience
-
Grants Coordinator
EMERGENCY ARTISTS SUPPORT LEAGUE
- Present 2 years 1 month
Arts and Culture
EASL supports artists in emergency situations via a robust grant program.
-
Co-Founder & Co-Chair
Art Boost
- Present 3 years 9 months
Education
Art Boost is a yearly transformational conference for artists teaching real-life business skills. From marketing your art, to copywriting your work, or bidding on RFPs and public works, Art Boost is the best place in Dallas to learn new skills, connect with other artists and network with professionals.
Recommendations received
1 person has recommended Leslie
Join now to viewView Leslie’s full profile
-
See who you know in common
-
Get introduced
-
Contact Leslie directly
Other similar profiles
Explore more posts
-
iTologyOK
517 followers
Running a business is hard. Managing IT shouldn’t be another uphill battle. Here’s the “3‑layer” structure we like for leaders who want security and simplicity: 1) Visibility: know what devices, accounts, and data you actually have 2) Protection: MFA + patching + backups as defaults 3) Response: clear steps for “what happens when something feels off” The goal isn’t complexity - it’s making technology work quietly in the background so you can focus on growth. Questions? Call us! itology.com
1
-
Central Texas Technology Solutions
452 followers
Most IT issues do not start with a cyberattack headline. They start with small decisions that quietly increase risk over time. In our latest article, we break down the most common IT support mistakes Austin businesses make and why reactive support, weak monitoring, and price-only vendor selection are putting Healthcare, Legal, Construction, Manufacturing, Professional Services, and Nonprofits at risk. If you lead a business in Central Texas, this is worth five minutes of your time. Strong IT is not about fixing tickets. It is about protecting growth, reducing downtime, and strengthening security. Read the full article here: 👉 https://lnkd.in/g9DfjzKv #CTTSonline #AustinTX #RoundRockTX #ManagedITServices #Cybersecurity #BusinessLeadership
-
TodoSecure
5 followers
Texas small-business leaders: have you tested your backups lately? This article outlines why backups, data recovery, and disaster‑recovery planning aren’t optional — and offers practical guidance to keep operations running during outages. Read the full piece by Christopher Nester: https://wix.to/LV48ub6 #DisasterRecovery #BusinessContinuity #Cybersecurity #SmallBusiness #ITManagement
1
-
GSG Talent Solutions
2K followers
Discover why Central Texas companies are turning to direct hire staffing in Austin to build stronger, more reliable teams. This video explores the long-term benefits of direct hire, including better retention, cost savings, and access to top talent. Learn how GSG Talent Solutions helps Austin businesses hire smarter and grow faster. #DirectHireAustin #AustinStaffing #GSGTalentSolutions #StaffingAgencyAustin #TempAgencyAustin
5
-
Talk To Th3 Doc podcast
3 followers
💡 This week’s Talk To Th3 Doc takeaway: “Compliance creates opportunity and reduces risk.” Local DFW businesses are using cybersecurity compliance to gain trust and win new opportunities. 📺 Watch: https://lnkd.in/g5YwxhyD 🎧 Listen: https://lnkd.in/gPNcisiF #TalkToTh3Doc #KellerBusiness #ManagedITDFW #Compliance
-
Jerry Allen, M. Ed., RTSBA
Waco ISD • 1K followers
Deep Dive: Cybersecurity in K12. An informational podcast about FERPA, Phishing, and Paychecks: Why Schools Are the Easiest Target for 4,300 Cyber Attacks Weekly. Generated with Notebook LM and authored by Jerry Allen, Chief Technology Officer for Waco ISD. https://lnkd.in/ePquypBW
5
-
Red Bigfoot Information Technology
259 followers
Every cybersecurity tool your business relies on is only as strong as the infrastructure behind it 🔒 Denver businesses that build proactive IT foundations see fewer disruptions Find out what a strong cybersecurity foundation actually looks like: https://lnkd.in/dgyJGQQH #Cybersecurity #DenverBusiness #ManagedITServices #ProactiveIT #ITStrategy
3
-
Dowd Insurance Agency
47 followers
🚨 Cyber alert for Texas businesses! A new state law outlines cybersecurity standards that could shield your business from liability after a data breach—but only if you're following best practices. Is your business covered? Learn what you need to know—and how cyber insurance can help fill the gaps. 👇 https://lnkd.in/eTRsR58X #CyberSecurity #TexasBusiness #SmallBizTips #CyberInsurance #DowdInsurance #AustinTX
3
-
Arrow Cyber Advisors
24 followers
Texas businesses: are you ready for what’s next in cybersecurity? 🔍 New threats are rising fast — understanding them isn’t optional anymore. From ransomware to cloud vulnerabilities, staying ahead means acting now. Here are key trends to watch: -Ransomware attacks are growing in both frequency and sophistication — backups + recovery + employee phishing awareness = non-negotiable. -Advanced threat detection using AI/ML is giving companies real-time visibility & better defense. -Cloud security challenges abound: encryption (in transit & at rest), strong access controls, and cloud provider compliance are essential. -Zero Trust models are no longer “nice to have” — strict identity verification + segmentation + continuous monitoring are rising quickly. -Human error still a major attack vector. Regular employee training + audits + compliance oversight = crucial. If you’re operating in Texas—or planning to—you should be asking: Which of these trends are we under-prepared for? Let’s talk strategy. 💡#Cybersecurity #TexasBusiness #CloudSecurity #ZeroTrust #AI #Compliance #RiskManagement #DataProtection #Ransomware #SecurityAwareness
3
1 Comment -
TechSage Solutions
354 followers
🔐 Did you know? Over 60% of small businesses that suffer a cyberattack close within 6 months. Small to Medium Size companies in Central and South Texas are being targeted more than ever. We just created a free Cyber Risk Scorecard. If your business checks 5 or more of these…You’re not just at risk — you’re already a target. DM us to find out where you’re most vulnerable.
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content