April 28 – May 1, 2025

@ RSA Conference 2025 USA

Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends.

BRIGHTTALK @ SUMMITS

RSA Conference 2025 USA

APRIL 28 – MAY 1, 2025

Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends.

Expertise, amplified.

Live-streamed expert conversations from the Moscone Center in San Francisco @RSAC2025.

Hear from security / IT / cyber risk experts and Enterprise Strategy Group Analysts, powered by TechTarget Studios.

We look forward to seeing you in Broadcast Alley.

Potential Discussion Topics

• Resilient Zero Trust Frameworks for Continuity in Decentralized Networks
• Cyber Resilience & Cyber Posture Management
• Best Practices in Harnessing AI for Active Cyber Defense
• CISO Perspectives on Tackling the Rise of AI-Powered Cyber Attacks
• Adapting Cybersecurity Strategies for a Borderless Digital World
• Proactive Security & The Critical Intersection of AI and Cybersecurity
• Human-Centric Data Security Vital for SaaS, Gen AI, and Cloud

• Practical Steps for Securing Generative AI Systems
• Revolutionizing Network Security with AI
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Transforming Security with Generative AI
• The Power of Threat Intelligence for Proactive Security

Examples of 2024 Snippet Videos:

How Can Organizations Be More Cyber-Resilient Today?

Theresa Lanowitz, Chief Evangelist, LevelBlue

Why Is It Difficult to Detect and Remediate Compromised Accounts?

Mike Britton, CISO, Abnormal Security

How Do You Think the Role of the CISO Will Evolve in the Next Five Years?

Renee Guttmann, Cybersecurity Industry Veteran with CXO Forum

Previous Participating Sponsors Include:

Cisco Panoptica

LevelBlue

Zscaler

Normalyze

CyberArk

Attending Enterprise Strategy Group Analysts:

Image for Melinda Marks

Melinda Marks

Practice Director, Application & Cloud Security

Enterprise Strategy Group

Image for Todd Thiemann

Todd Thiemann

Senior Analyst, IAM & Data Security

Enterprise Strategy Group

Image for Dave Gruber

Dave Gruber

Principal Analyst, Ransomware, SecOps & Services

Enterprise Strategy Group

Image for Tyler Shields

Tyler Shields

Principal Analyst, Risk & Vulnerability Management

Enterprise Strategy Group

Areas of Expertise – Click Here

• API Security
• Application Security
• Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-native Technologies

Areas of Expertise – Click Here

• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Non-human Identity Management
• Passwordless Authentication

Areas of Expertise – Click Here

• All Things Security Operations
• Leveraging AI in SecOps
• Managed Detection & Response
• MidMarket Cybersecurity Strategies
• Ransomware Security Strategies
• Security Analytics
• SIEMs, SOAR
• The XDR Movement
• Threat Detection & Response
• Threat Intelligence

Areas of Expertise – Click Here

• API Security
• Application Security Posture Management
• Attack Surface Risk Management
• GRC/Compliance
• Offensive Security Technologies
• Pen Testing Services
• Risk Analysis
• Threat & Exposure Management
• Threat Identification
• Threat Intelligence
• Vulnerability Management

Image for John Grady

John Grady

Principal Analyst, Network Security & Web Application Security

Enterprise Strategy Group

Image for Gabe Knuth

Gabe Knuth

Senior Analyst, End-user Computing & User Protection

Enterprise Strategy Group

Areas of Expertise – Click Here

• Bot Mitigation
• CASB
• DDoS
• Firewall
• IPS
• Microsegmentation
• NDR
• Network Security
• NGFW & IDS/IPS
• SASE
• Web Application & API Security
• Web Security
• Zero Trust

Areas of Expertise – Click Here


• Desktop & App Virtualization (VDI)
• Desktop-as-a-Service (DaaS)
• Digital Employee Experience (DEX)
• Digital Workspaces
• Email Security
• End-User Devices & Hardware
• End-User Monitoring & Performance
• Endpoint Lifecycle Management
• Endpoint Security
• Meeting Room Devices & Hardware
• Team Collaboration & Messaging
• Unified Communications/UCaaS
• Unified Endpoint Management/Mobile Device Management
• User Environment Management
• Windows Application Management

In Partnership With:

Informa TechTarget

Enterprise Strategy Group

Omdia

DarkReading

CybersecurityDive

TechTarget and Search Security