August 4 – 7, 2025

@ Black Hat USA 2025

Tune in with other IT and Cyber Security professionals as we speak to experts and researchers about the latest cybersecurity landscape, threats and trends!

Expertise, amplified.

Live-streamed expert conversations from Las Vegas @BlackHat2025.

Hear from security / IT / cyber risk experts and Enterprise Strategy Group Analysts, powered by TechTarget Studios.

We look forward to seeing you in Las Vegas.

View Content From @ Black Hat USA 2024 Here

Watch our @ RSAC content promo video

Potential Discussion Topics – Click Here

• Proven Strategies to Safeguard Software Supply Chains from Catastrophe
• Data Access Versus Data Security: The Tug-of-War Between CDOs and CISOs
• Securing Machine Identities In 2025 & Beyond
• The State of Application Security 2025: Key Trends & What To Expect Next
• C-Suite Perspectives: 5 Steps to Enhance Cyber Resilience
• Exploring VPN Post-Exploitation Techniques
• Real World SaaS Attacks and Mitigation Strategies
• Exploiting Cloud Provider Vulnerabilities for Initial Access to the Cloud
• Threat Hunting & Incident Response – Setting Standards Against Information Threats
• Balancing AI Innovation with Cybersecurity & Emerging Threats
• The Future of AppSec & Applying AI to Minimize Risk and Protect Applications
• Threat Propensity & How Industries Are Prepared to Withstand an Attack
• Securing Network Appliances: New Technologies and Old Challenges
• From MLOps to MLOops – Exposing the Attack Surface of Machine Learning Platforms

Examples of 2024 Snippet Videos:

What Is the Most Important Thing To Know About Securing Your Machine Identities?

Uzi Ailon, VP, DevSecOps Solutions at CyberArk

What Does LevelBlue’s Latest Report Reveal About How the C-Suite Sees Cyber Resilience?

Theresa Lanowitz, Chief Evangelist at LevelBlue

The Convergence of Data and Security? Does the CDO Become the New CD+SO?

Matt Murphy, Lead DevSecOps Engineer & Cyber Security Architect at Beyond Finance

What Do You Predict Will Be the Most Significant Change in the Application Security Space, and What Do You See as the Biggest Challenge for Companies Striving To Reach the Next Level of Maturity?

Boaz Barzel, Director of Product Marketing, Enablement & Revenue Operations at OX Security

What Are Some of the Things Your Organization Is Doing To Stay Aligned Around Data Security?

Toby Foss, Senior Director, Information Security at Informatica

What Challenges Do You Believe Cause the Most Pain When Trying To Mitigate Risks and Ensure the Integrity and Security of Not Only Your Application Portfolio But Also the Underlying Software Factory?

Joe Nicastro, Field CTO at Legit Security

Previous Participating Sponsors Include:

Legit Security

LevelBlue

OX Security

Normalyze

CyberArk

CrowdSec

Mimecast

Qualys

Tanium

Checkmarx

SonarSource

Attending Enterprise Strategy Group Analysts:

Image for Melinda Marks

Melinda Marks

Practice Director, Application & Cloud Security

Enterprise Strategy Group

Image for Todd Thiemann

Todd Thiemann

Senior Analyst, IAM & Data Security

Enterprise Strategy Group

Image for Dave Gruber

Dave Gruber

Principal Analyst, Ransomware, SecOps & Services

Enterprise Strategy Group

Image for John Grady

John Grady

Principal Analyst, Network Security & Web Application Security

Enterprise Strategy Group

Areas of Expertise – Click Here

• API Security
• Application Security & Container Security
• Secure DevOps (DevSecOps)
• Web Application Security Testing (SAST, DAST, IAST, SCA)
• Cloud Security Posture Management
• Cloud Workload Protection Platforms
• Cloud-Native Security & Technologies
• Hybrid & Multi-Cloud Security

Areas of Expertise – Click Here

• AI & ML in Cybersecurity
• Data Loss Prevention
• Data Security Posture Management
• Encryption & Key Management
• Identity & Access Management (IAM)
• Identity Security Posture Management (ISPM)
• Identity Threat Detection & Response (ITDR)
• Passwordless Authentication

Areas of Expertise – Click Here

• Attack Surface Management (ASM)
• Data Leakage Prevention
• DevSecOps
• Extended Detection & Response
• Managed Detection & Response
• Ransomware Security Strategies
• Security Analytics | Security Operations
• SIEMs | SOAR | The XDR Movement
• Threat Detection & Response

Areas of Expertise – Click Here

• Web Application & API Security
• Web Security Zero Trust
• Network Security
• Network Detection & Response
• SASE
• Bot Mitigation
• Firewall
• IPS Microsegmentation
• CASB | DDoS | NGFW | IDS/IPS

In Partnership With:

TechTarget

ESG by TechTarget