BRIGHTTALK @ SUMMITS
BlackHat 2025
AUGUST 4 – 7, 2025
Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends.
Expertise, amplified.
Live-streamed expert conversations from Las Vegas @BlackHat 2025.
Hear from security / IT / cyber risk experts and Enterprise Strategy Group analysts, powered by TechTarget Studios.
We Look forward to seeing you in Las Vegas.
Watch our @ RSAC content promo video
Potential Discussion Topics
• Proven Strategies to Safeguard Software Supply Chains from Catastrophe
• Data Access Versus Data Security: The Tug-of-War Between CDOs and CISOs
• Securing Machine Identities In 2025 & Beyond
• The State of Application Security 2025: Key Trends & What To Expect Next
• C-Suite Perspectives: 5 Steps to Enhance Cyber Resilience
• Exploring VPN Post-Exploitation Techniques
• Real World SaaS Attacks and Mitigation Strategies
• Exploiting Cloud Provider Vulnerabilities for Initial Access to the Cloud
• Threat Hunting & Incident Response – Setting Standards Against Information Threats
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Securing Network Appliances: New Technologies and Old Challenges
• From MLOps to MLOops – Exposing the Attack Surface of Machine Learning Platforms
Examples of 2024 Snippet Videos:

What Is the Most Important Thing To Know About Securing Your Machine Identities?
Uzi Ailon, VP, DevSecOps Solutions at CyberArk

What Does LevelBlue’s Latest Report Reveal About How the C-Suite Sees Cyber Resilience?
Theresa Lanowitz, Chief Evangelist at LevelBlue

The Convergence of Data and Security? Does the CDO Become the New CD+SO?
Matt Murphy, Lead DevSecOps Engineer & Cyber Security Architect at Beyond Finance
Previous Participating Sponsors Include:
Legit Security

LevelBlue

OX Security

Normalyze

CyberArk

Attending Enterprise Strategy Group Analysts:

Melinda Marks

Todd Thiemann

Dave Gruber

John Grady
Areas of Expertise – Click Here
• API Security
• Application Security & Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-Native Security & Technologies
• Hybrid & Multi-Cloud Security
Areas of Expertise – Click Here
• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Passwordless Authentication
Areas of Expertise – Click Here
• Attack Surface Management (ASM)
• Data Leakage Prevention
• DevSecOps
• Extended Detection & Response
• Managed Detection & Response
• Ransomware Security Strategies
• Security Analytics | Security Operations
• SIEMs | SOAR | The XDR Movement
• Threat Detection & Response
Areas of Expertise – Click Here
• Web Application & API Security
• Web Security Zero Trust
• Network Security
• Network Detection & Response
• SASE
• Bot Mitigation
• Firewall
• IPS Microsegmentation
• CASB | DDoS | NGFW | IDS/IPS
In Partnership With:
Informa TechTarget

Enterprise Strategy Group

Omdia

DarkReading

CybersecurityDive

TechTarget and Search Security
