A Conversations with Reach Podcast

No Time to Drift

Sebastian Goodwin, Chief Trust Officer at Autodesk, and John Rasmussen, former CISO at Syneos Health and now Senior Analyst at TAG Infosphere, join Garrett Hamilton, Co-Founder & CEO of Reach Security, for a conversation moderated by Ed Amoroso, CEO of TAG Infosphere — discussing one of security’s most persistent challenges: configuration drift, and how AI-driven automation is reshaping how teams detect, manage, and prevent it.
Why Drift Matters

Configuration drift happens quietly.

As environments evolve, policies, tools, and settings begin to diverge from their intended state — often without visibility until an incident occurs. What begins as a small misalignment can compound into real security exposure.

This discussion explores how even the most mature organizations struggle with drift, and what can be done to get ahead of it.

Key Outcomes Discussed:

  • Why Drift Matters — How small configuration changes compound into real security risk, and why even well-resourced teams struggle to keep environments aligned.
  • AI as a New Approach — How emerging AI agents and automation are helping security teams detect and remediate drift faster — without losing human oversight or control.
  • What’s Next — A look ahead at how AI-assisted architecture could continuously enforce secure baselines and move organizations closer to “secure by design.”

By the Numbers: The Growing Impact of Drift

  • $5 million — The average cost of a data breach, with misconfiguration listed among the top five contributing factors.
  • 59% — Organizations that report difficulty maintaining consistent configurations across their cloud environments.
  • 700+ — Companies indirectly affected in 2025 by a single SaaS configuration error.
  • $5,600 per minute — Estimated average cost of IT downtime linked to configuration errors and drift.

(Sources: Wiz.io, CoreView 2024 Report, Reco.ai, Gartner)

Learn More About How Reach Combats Configuration Drift:

Explore how Reach helps organizations detect and prevent drift before it turns into exposure.

Reach is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Featured Participants

Moderator
Ed Amoroso
CEO, TAG Infosphere

Ed is the CEO of TAG Infosphere and a distinguished research professor at NYU Tandon. He previously served as Senior Vice President & Chief Security Officer at AT&T, culminating a 31-year career beginning in Unix security R&D at Bell Labs. His leadership spans academia,
industry, and national-security advisory roles.

Speaker
Garrett Hamilton
Garrett Hamilton
Co-Founder & CEO, Reach Security

Garrett co-founded Reach Security where he leads the mission to help organizations operationalize exposure management. Previously he held leadership roles in SaaS product management and go-to-market strategy at major cybersecurity firms including Palo Alto Networks.

Speaker
Sebastian Goodwin
Chief Trust Officer, Autodesk

Sebastian leads Autodesk’s global strategy on security, privacy, trusted AI and resilience, ensuring the company’s commitments to customers and stakeholders are upheld. He is a recognized cybersecurity leader with more than 20 years of experience helping large organizations measure and manage cyber risk.

Speaker
John Rasmussen
Senior Analyst, TAG Infosphere |
Former CISO, Syneos Health

John brings 25+ years of enterprise cybersecurity experience, including serving as CISO of Syneos Health. He now advises organizations as a Senior Analyst at TAG Infosphere on emerging security architecture, automation, and AI-adoption trends.

Trusted by leading security teams

Aristocrat logoAutodesk Logomps white logoNutanix logo

Success Stories

Reach customers share results

Discover how organizations like yours are closing security gaps, maximizing their tools, and reducing complexity with Reach - a unified platform with AI-powered virtual assistants to help teams improve posture and performance. These are their stories.

jay wilson

Jay Wilson

CIO & CISO

“We simply didn’t have the time in the day to do this kind of analysis. Reach made it possible in minutes.”
Read the Case Study
huy

Huy Ly

Head of Global IT Security/Infrastructure

“Security talent is limited. That’s why I partner with innovators; people willing to build with me. Reach fit that mindset perfectly.”
Read the Case Study
Raymond Winder

Ray Winder

Director of Information Security

Autodesk Logo
“We found value almost immediately once we deployed Reach. It only took a few minutes to integrate the product in the Autodesk environment.”
Read the Case Study
Joe Masud

Joe Masud

VP Security Architecture

“Reach Remediations have been a game-changer for our team. They simplify the process of identifying what needs to be done and provide detailed, actionable guidance to get it done efficiently. It’s like having a trusted guide for optimizing our security posture, saving us time.”
Read the Case Study
Sebastian Goodwin

Sebastian Goodwin

Former VP & CISO

Nutanix logo
“Reach has really shined a light on our blind spots and told us things we didn’t know our products could do. I think of Reach as a cheat code for our security products.”
Read the Case Study
arrow left
arrow right

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Reach Named Best Continuous Threat Exposure Management (CTEM) Solution by SC Awards 2026
Learn more
arrow rightarrow right