BRIGHTTALK @ SUMMITS

RSA Conference 2025 USA

Expertise, amplified.

Examples of 2024 Snippet Videos:

How Can Organizations Be More Cyber-Resilient Today?

Theresa Lanowitz, Chief Evangelist, LevelBlue

Why Is It Difficult to Detect and Remediate Compromised Accounts?

Mike Britton, CISO, Abnormal Security

How Do You Think the Role of the CISO Will Evolve in the Next Five Years?

Renee Guttmann, Cybersecurity Industry Veteran with CXO Forum

Previous Participating Sponsors Include:

Cisco Panoptica

LevelBlue

Zscaler

Normalyze

CyberArk

Attending Enterprise Strategy Group Analysts:

Image for Melinda Marks

Melinda Marks

Practice Director, Application & Cloud Security

Enterprise Strategy Group

Image for Todd Thiemann

Todd Thiemann

Senior Analyst, IAM & Data Security

Enterprise Strategy Group

Image for Dave Gruber

Dave Gruber

Principal Analyst, Ransomware, SecOps & Services

Enterprise Strategy Group

Image for Tyler Shields

Tyler Shields

Principal Analyst, Risk & Vulnerability Management

Enterprise Strategy Group

Areas of Expertise – Click Here

• API Security
• Application Security
• Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-native Technologies

Areas of Expertise – Click Here

• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Non-human Identity Management
• Passwordless Authentication

Areas of Expertise – Click Here

• All Things Security Operations
• Leveraging AI in SecOps
• Managed Detection & Response
• MidMarket Cybersecurity Strategies
• Ransomware Security Strategies
• Security Analytics
• SIEMs, SOAR
• The XDR Movement
• Threat Detection & Response
• Threat Intelligence

Areas of Expertise – Click Here

• API Security
• Application Security Posture Management
• Attack Surface Risk Management
• GRC/Compliance
• Offensive Security Technologies
• Pen Testing Services
• Risk Analysis
• Threat & Exposure Management
• Threat Identification
• Threat Intelligence
• Vulnerability Management

Image for John Grady

John Grady

Principal Analyst, Network Security & Web Application Security

Enterprise Strategy Group

Image for Gabe Knuth

Gabe Knuth

Senior Analyst, End-user Computing & User Protection

Enterprise Strategy Group

Areas of Expertise – Click Here

• Bot Mitigation
• CASB
• DDoS
• Firewall
• IPS
• Microsegmentation
• NDR
• Network Security
• NGFW & IDS/IPS
• SASE
• Web Application & API Security
• Web Security
• Zero Trust

Areas of Expertise – Click Here

• Desktop & App Virtualization (VDI)
• Desktop-as-a-Service (DaaS)
• Digital Employee Experience (DEX)
• Digital Workspaces
• Email Security
• End-User Devices & Hardware
• End-User Monitoring & Performance
• Endpoint Lifecycle Management
• Endpoint Security
• Meeting Room Devices & Hardware
• Team Collaboration & Messaging
• Unified Communications/UCaaS
• Unified Endpoint Management/Mobile Device Management
• User Environment Management
• Windows Application Management

In Partnership With:

Informa TechTarget

Enterprise Strategy Group

Omdia

DarkReading

CybersecurityDive

TechTarget and Search Security