April 28 – May 1, 2025
@ RSA Conference 2025 USA
Tune in with other IT and Cyber Security professionals as we spoke to experts and researchers about the latest cybersecurity landscape, threats and trends.
Expertise, amplified.
Live-streamed expert conversations from the Moscone Center in San Francisco @RSAC2025.
Hear from security / IT / cyber risk experts and Enterprise Strategy Group Analysts, powered by TechTarget Studios.
We look forward to seeing you in Broadcast Alley!
View Content From @ RSA Conference 2024 USA Here
Potential Discussion Topics – Click Here
• Resilient Zero Trust Frameworks for Continuity in Decentralized Networks
• Cyber Resilience & Cyber Posture Management
• Best Practices in Harnessing AI for Active Cyber Defense
• CISO Perspectives on Tackling the Rise of AI-Powered Cyber Attacks
• Adapting Cybersecurity Strategies for a Borderless Digital World
• Proactive Security & The Critical Intersection of AI and Cybersecurity
• Human-Centric Data Security Vital for SaaS, Gen AI, and Cloud
• Practical Steps for Securing Generative AI Systems
• Revolutionizing Network Security with AI
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Transforming Security with Generative AI
• The Power of Threat Intelligence for Proactive Security
Examples of 2024 Snippet Videos:
Unravel the Complexities of Cyber Resilience & How to Overcome Various Barriers
Theresa Lanowitz, Chief Evangelist at LevelBlue
Cross-Platform Account Takeovers & How to Protect Your Organization
Mike Britton, CISO at Abnormal Security
CISOs Share Five Must-Dos to Protect Data
Renee Guttmann, Cybersecurity Industry Veteran with CXO Forum
Human-Centric Data Security Vital for SaaS, Gen AI, and Cloud
Rich Vibert, CEO and Co-Founder of Metomic
Applying AI to Minimize Risk and Protect Applications
Frank Catucci, CTO at Invicti
Convergence of Cloud Security & Cloud Networking to Strengthen Attack Response
Doug Merritt, CEO of Aviatrix
Previous Participating Sponsors Include:
Cisco Panoptica
LevelBlue
Zscaler
Normalyze
CyberArk
Abnormal Security
Aviatrix Systems
Cradlepoint
SimSpace
Invicti
ESET
Lacework
Entrust
Metomic
Interpres Security
Attending Enterprise Strategy Group Analysts:
Melinda Marks
Todd Thiemann
Dave Gruber
Jon Oltsik
Areas of Expertise – Click Here
• API Security
• Application Security & Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-Native Security & Technologies
• Hybrid & Multi-Cloud Security
Areas of Expertise – Click Here
• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Passwordless Authentication
Areas of Expertise – Click Here
• Attack Surface Management (ASM)
• Data Leakage Prevention
• DevSecOps
• Extended Detection & Response
• Managed Detection & Response
• Ransomware Security Strategies
• Security Analytics | Security Operations
• SIEMs | SOAR | The XDR Movement
• Threat Detection & Response
Areas of Expertise – Click Here
• Founded the Cybersecurity Practice at Enterprise Strategy Group in 2003
• Cybersecurity Program Strategies
• Office of the CISO | CISO Perspectives
• Cyber Risk Management | Cyber Threats
• Technical Defenses
• Cyber Resilience & Cyber Posture Management
• Engaged in Legislation & Technology Discussions within the US Government
John Grady
Gabe Knuth
Areas of Expertise – Click Here
• Web Application & API Security
• Web Security Zero Trust
• Network Security
• Network Detection & Response
• SASE
• Bot Mitigation
• Firewall
• IPS Microsegmentation
• CASB | DDoS | NGFW | IDS/IPS
Areas of Expertise – Click Here
• End-User Computing & User Protection
• End-User Monitoring & Performance & End-User Devices & Hardware
• Endpoint Lifecycle Management
• Endpoint Security
• Desktop & App Virtualization (VDI) & Desktop-as-a-Service (DaaS)
• Windows Application Management & Device Management
• Unified Communications/UCaaS