April 28 – May 1, 2025

@ RSA Conference 2025 USA

Tune in with other IT and Cyber Security professionals as we spoke to experts and researchers about the latest cybersecurity landscape, threats and trends.

Expertise, amplified.

Live-streamed expert conversations from the Moscone Center in San Francisco @RSAC2025.

Hear from security / IT / cyber risk experts and Enterprise Strategy Group Analysts, powered by TechTarget Studios.

We look forward to seeing you in Broadcast Alley!

View Content From @ RSA Conference 2024 USA Here

Potential Discussion Topics – Click Here

• Resilient Zero Trust Frameworks for Continuity in Decentralized Networks
• Cyber Resilience & Cyber Posture Management
• Best Practices in Harnessing AI for Active Cyber Defense
• CISO Perspectives on Tackling the Rise of AI-Powered Cyber Attacks
• Adapting Cybersecurity Strategies for a Borderless Digital World
• Proactive Security & The Critical Intersection of AI and Cybersecurity
• Human-Centric Data Security Vital for SaaS, Gen AI, and Cloud
• Practical Steps for Securing Generative AI Systems
• Revolutionizing Network Security with AI
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Transforming Security with Generative AI
• The Power of Threat Intelligence for Proactive Security

Examples of 2024 Snippet Videos:

Unravel the Complexities of Cyber Resilience & How to Overcome Various Barriers

Theresa Lanowitz, Chief Evangelist at LevelBlue

Cross-Platform Account Takeovers & How to Protect Your Organization

Mike Britton, CISO at Abnormal Security

CISOs Share Five Must-Dos to Protect Data

Renee Guttmann, Cybersecurity Industry Veteran with CXO Forum

Human-Centric Data Security Vital for SaaS, Gen AI, and Cloud

Rich Vibert, CEO and Co-Founder of Metomic

Applying AI to Minimize Risk and Protect Applications

Frank Catucci, CTO at Invicti

Convergence of Cloud Security & Cloud Networking to Strengthen Attack Response

Doug Merritt, CEO of Aviatrix

Previous Participating Sponsors Include:

Cisco Panoptica

LevelBlue

Zscaler

Normalyze

CyberArk

Abnormal Security

Aviatrix Systems

Cradlepoint

SimSpace

Invicti

ESET

Lacework

Entrust

Metomic

Interpres Security

Attending Enterprise Strategy Group Analysts:

Image for Melinda Marks

Melinda Marks

Practice Director, Application & Cloud Security

Enterprise Strategy Group

Image for Todd Thiemann

Todd Thiemann

Senior Analyst, IAM & Data Security

Enterprise Strategy Group

Image for Dave Gruber

Dave Gruber

Principal Analyst, Ransomware, SecOps & Services

Enterprise Strategy Group

Image for Jon Oltsik

Jon Oltsik

Analyst Emeritus, Cybersecurity Strategies

Enterprise Strategy Group

Areas of Expertise – Click Here

• API Security
• Application Security & Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-Native Security & Technologies
• Hybrid & Multi-Cloud Security

Areas of Expertise – Click Here

• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Passwordless Authentication

Areas of Expertise – Click Here

• Attack Surface Management (ASM)
• Data Leakage Prevention
• DevSecOps
• Extended Detection & Response
• Managed Detection & Response
• Ransomware Security Strategies
• Security Analytics | Security Operations
• SIEMs | SOAR | The XDR Movement
• Threat Detection & Response

Areas of Expertise – Click Here

• Founded the Cybersecurity Practice at Enterprise Strategy Group in 2003
• Cybersecurity Program Strategies
• Office of the CISO | CISO Perspectives
• Cyber Risk Management | Cyber Threats
• Technical Defenses
• Cyber Resilience & Cyber Posture Management
• Engaged in Legislation & Technology Discussions within the US Government

Image for John Grady

John Grady

Principal Analyst, Network Security & Web Application Security

Enterprise Strategy Group

Image for Gabe Knuth

Gabe Knuth

Senior Analyst, End-user Computing & User Protection

Enterprise Strategy Group

Areas of Expertise – Click Here

• Web Application & API Security
• Web Security Zero Trust
• Network Security
• Network Detection & Response
• SASE
• Bot Mitigation
• Firewall
• IPS Microsegmentation
• CASB | DDoS | NGFW | IDS/IPS

Areas of Expertise – Click Here

• End-User Computing & User Protection
• End-User Monitoring & Performance & End-User Devices & Hardware
• Endpoint Lifecycle Management
• Endpoint Security
• Desktop & App Virtualization (VDI) & Desktop-as-a-Service (DaaS)
• Windows Application Management & Device Management
• Unified Communications/UCaaS

In Partnership With:

TechTarget

ESG by TechTarget