April 28 – May 1, 2025
@ RSA Conference 2025 USA
Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends.
BRIGHTTALK @ SUMMITS
RSA Conference 2025 USA
APRIL 28 – MAY 1, 2025
Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends.
Expertise, amplified.
Live-streamed expert conversations from the Moscone Center in San Francisco @RSAC2025.
Hear from security / IT / cyber risk experts and Enterprise Strategy Group Analysts, powered by TechTarget Studios.
We look forward to seeing you in Broadcast Alley.
Potential Discussion Topics
• Resilient Zero Trust Frameworks for Continuity in Decentralized Networks
• Cyber Resilience & Cyber Posture Management
• Best Practices in Harnessing AI for Active Cyber Defense
• CISO Perspectives on Tackling the Rise of AI-Powered Cyber Attacks
• Adapting Cybersecurity Strategies for a Borderless Digital World
• Proactive Security & The Critical Intersection of AI and Cybersecurity
• Human-Centric Data Security Vital for SaaS, Gen AI, and Cloud
• Practical Steps for Securing Generative AI Systems
• Revolutionizing Network Security with AI
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Transforming Security with Generative AI
• The Power of Threat Intelligence for Proactive Security
Examples of 2024 Snippet Videos:
Previous Participating Sponsors Include:
Cisco Panoptica

LevelBlue

Zscaler

Normalyze

CyberArk

Attending Enterprise Strategy Group Analysts:

Melinda Marks

Todd Thiemann

Dave Gruber

Tyler Shields
Areas of Expertise – Click Here
• API Security
• Application Security
• Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-native Technologies
Areas of Expertise – Click Here
• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Non-human Identity Management
• Passwordless Authentication
Areas of Expertise – Click Here
• All Things Security Operations
• Leveraging AI in SecOps
• Managed Detection & Response
• MidMarket Cybersecurity Strategies
• Ransomware Security Strategies
• Security Analytics
• SIEMs, SOAR
• The XDR Movement
• Threat Detection & Response
• Threat Intelligence
Areas of Expertise – Click Here
• API Security
• Application Security Posture Management
• Attack Surface Risk Management
• GRC/Compliance
• Offensive Security Technologies
• Pen Testing Services
• Risk Analysis
• Threat & Exposure Management
• Threat Identification
• Threat Intelligence
• Vulnerability Management

John Grady

Gabe Knuth
Areas of Expertise – Click Here
• Bot Mitigation
• CASB
• DDoS
• Firewall
• IPS
• Microsegmentation
• NDR
• Network Security
• NGFW & IDS/IPS
• SASE
• Web Application & API Security
• Web Security
• Zero Trust
Areas of Expertise – Click Here
• Desktop & App Virtualization (VDI)
• Desktop-as-a-Service (DaaS)
• Digital Employee Experience (DEX)
• Digital Workspaces
• Email Security
• End-User Devices & Hardware
• End-User Monitoring & Performance
• Endpoint Lifecycle Management
• Endpoint Security
• Meeting Room Devices & Hardware
• Team Collaboration & Messaging
• Unified Communications/UCaaS
• Unified Endpoint Management/Mobile Device Management
• User Environment Management
• Windows Application Management
In Partnership With:
Informa TechTarget

Enterprise Strategy Group

Omdia

DarkReading

CybersecurityDive

TechTarget and Search Security
