August 4 – 7, 2025
@ Black Hat USA 2025
Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends!
Expertise, amplified.
Live-streamed expert conversations from Las Vegas @BlackHat2025.
Hear from security / IT / cyber risk experts and Enterprise Strategy Group Analysts, powered by TechTarget Studios.
We look forward to seeing you in Las Vegas.
View Content From @ Black Hat USA 2024 Here
Watch our @ RSAC content promo video
Potential Discussion Topics – Click Here
• Proven Strategies to Safeguard Software Supply Chains from Catastrophe
• Data Access Versus Data Security: The Tug-of-War Between CDOs and CISOs
• Securing Machine Identities In 2025 & Beyond
• The State of Application Security 2025: Key Trends & What To Expect Next
• C-Suite Perspectives: 5 Steps to Enhance Cyber Resilience
• Exploring VPN Post-Exploitation Techniques
• Real World SaaS Attacks and Mitigation Strategies
• Exploiting Cloud Provider Vulnerabilities for Initial Access to the Cloud
• Threat Hunting & Incident Response – Setting Standards Against Information Threats
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Securing Network Appliances: New Technologies and Old Challenges
• From MLOps to MLOops – Exposing the Attack Surface of Machine Learning Platforms
Examples of 2024 Snippet Videos:
What Is the Most Important Thing To Know About Securing Your Machine Identities?
Uzi Ailon, VP, DevSecOps Solutions at CyberArk
What Does LevelBlue’s Latest Report Reveal About How the C-Suite Sees Cyber Resilience?
Theresa Lanowitz, Chief Evangelist at LevelBlue
The Convergence of Data and Security? Does the CDO Become the New CD+SO?
Matt Murphy, Lead DevSecOps Engineer & Cyber Security Architect at Beyond Finance
What Do You Predict Will Be the Most Significant Change in the Application Security Space, and What Do You See as the Biggest Challenge for Companies Striving To Reach the Next Level of Maturity?
Boaz Barzel, Director of Product Marketing, Enablement & Revenue Operations at OX Security
What Are Some of the Things Your Organization Is Doing To Stay Aligned Around Data Security?
Toby Foss, Senior Director, Information Security at Informatica
What Challenges Do You Believe Cause the Most Pain When Trying To Mitigate Risks and Ensure the Integrity and Security of Not Only Your Application Portfolio But Also the Underlying Software Factory?
Joe Nicastro, Field CTO at Legit Security
Previous Participating Sponsors Include:
Legit Security
LevelBlue
OX Security
Normalyze
CyberArk
CrowdSec
Mimecast
Qualys
Tanium
Checkmarx
SonarSource
Attending Enterprise Strategy Group Analysts:
Melinda Marks
Todd Thiemann
Dave Gruber
John Grady
Areas of Expertise – Click Here
• API Security
• Application Security & Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-Native Security & Technologies
• Hybrid & Multi-Cloud Security
Areas of Expertise – Click Here
• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Passwordless Authentication
Areas of Expertise – Click Here
• Attack Surface Management (ASM)
• Data Leakage Prevention
• DevSecOps
• Extended Detection & Response
• Managed Detection & Response
• Ransomware Security Strategies
• Security Analytics | Security Operations
• SIEMs | SOAR | The XDR Movement
• Threat Detection & Response
Areas of Expertise – Click Here
• Web Application & API Security
• Web Security Zero Trust
• Network Security
• Network Detection & Response
• SASE
• Bot Mitigation
• Firewall
• IPS Microsegmentation
• CASB | DDoS | NGFW | IDS/IPS