
Nathan Case
Incident response is the distilled product of your technical program.
New York City, New York, United States
Actions
Nathan Case is a successful executive and builder, pushing for change in security and the culture surrounding it. Leading strategic initiatives and the creation of new technologies in the healthcare, information technology and cloud industries, focusing on security. A passion for Incident Response, and operational security in all forms. Pushing the bounds of threat detection and response. Finding new thoughts and bringing them to the fields of security and technology.
Links
Area of Expertise
Topics
Reuniting the Stack: Why Dev, Ops, and Security Must Come Back Together
This talk explores the historical reasons behind the separation of development, operations, and security within enterprises—why it once made sense, where it went wrong, and what we can do to fix it. We’ll examine the unintended consequences of this split and how it has led to systemic friction, misaligned priorities, and long-term security vulnerabilities.
Audiance will gain insight into the semantic and cultural disconnects that have developed between these teams, and how those disconnects have shaped—and sometimes broken—our technical architectures. Through real-world examples, we’ll examine the critical failures that emerge when security is treated as someone else’s job, and how that mindset continues to cause lasting damage.
The session isn’t technical, but it is deeply practical. Attendees will leave with a new perspective on cross-functional collaboration, concrete strategies to realign teams, and guidance on using tools and shared language to bridge silos. If you work in or around large enterprise environments, this talk offers a path forward—toward integrated, resilient, and truly collaborative tech organizations.
Weapons of Mass Disruption: Nation-State Hacks in Labs and Industry
In this session, we dive into the dark realities of nation-state cyber operations targeting research laboratories, industrial manufacturing, and critical infrastructure. Through three real-world case studies, we’ll examine how sophisticated attackers exploit both system vulnerabilities and human errors—misconfigurations, misuse, and insider threats—to gain access to high-value environments.
These aren’t just theoretical risks. The consequences of these breaches include stolen intellectual property, halted operations, damaged equipment, and in some cases, physical harm. Attendees will gain a clear understanding of how cascading failures unfold and why human and operational factors remain the most overlooked aspects of securing complex environments.
We’ll end with actionable strategies to harden your systems—focusing on security-driven standard operating procedures, real-time monitoring technologies, and resilient equipment architectures. If your organization touches critical infrastructure, scientific research, or OT environments, this talk will leave you with the insights you need to prepare for the threats already knocking on your door.

Nathan Case
Incident response is the distilled product of your technical program.
New York City, New York, United States
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top