CyberRisk TV Live from RSAC Conference 2025 Day 1 Daily Intro – RSAC25 #1
Matt Alderman, host of Business Security Weekly podcast, and Mandy Logan, host of Paul's Security Weekly podcast, kick-off the CyberRisk TV livestream from RSAC Conference 2025! They discuss what they are most looking forward to this year, helpful tips for getting around the event, and must see presentations!
Securing What You Don’t Own: Introducing Supply Chain Detection and Response – Dr. Aleksandr Yampolskiy – RSAC25 #1
Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain.
What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/
Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/
Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form
This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks.
Dr. Aleksandr Yampolskiy, Co-Founder and Chief Executive Officer of SecurityScorecard, is a globally recognized cybersecurity innovator, leader, and expert. Since SecurityScorecard’s inception in 2014, he has led the company with a vision to create a new language for measuring and communicating risk. SecurityScorecard is now one of the world’s most trusted cybersecurity brands, with tens of thousands of customers—including two-thirds of the Fortune 100 and nine of the top 10 U.S. banks—and over 600 employees. Under Yampolskiy’s leadership, SecurityScorecard created the Supply Chain Detection and Response (SCDR) category, transforming how organizations defend against the fastest-growing threat vector—supply chain attacks. The company’s industry-leading security ratings now serve as the foundation and core strength, while SCDR continuously monitors third-party risks using our factor-based ratings, automated assessments and proprietary threat intelligence, to resolve threats before they become breaches.
Prior to founding the SecurityScorecard, Yampolskiy was a CTO at BlogTalkRadio, the largest online talk radio and podcast hosting platform, whose technology he scaled to over 30M+ visitors each month. He was also a CISO at Gilt Groupe, where he managed all aspects of IT infrastructure security, fraud, secure application development, and PCI compliance. Yampolskiy has led security teams at Goldman Sachs and Oracle, among other companies where he built authentication and entitlement infrastructure for trading.
New AppSec Risks in the AI Era – Idan Plotnik – RSAC25 #1
This is an intro into Apiiro and it's CEO & Co-Founder, Idan Plotnik. We'll talk about the AI problem in AppSec
This segment is sponsored by Apiiro. Visit https://securityweekly.com/apiirorsac to learn more about them!
Idan Plotnik is a serial entrepreneur and product strategist, with more than 20 years of experience in cybersecurity. He is the Co-Founder & CEO at Apiiro, the ASPM platform that empowers companies like Morgan Stanley, Blackrock, Rakuten, SoFi, and Shell to automatically discover their software architecture and identify risky changes so they can prevent application risk without slowing innovation.
Previously, Idan was GM of Software Engineering at Microsoft following the acquisition of Aorato where he served as the Founder & CEO.
Who Goes There? The Identity Security Playbook in a Machine-Driven World – Hed Kovetz – RSAC25 #1
Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it’s now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren’t just hacking systems anymore—they’re hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today’s most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand.
Segment Resources: https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/
This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security!
Hed Kovetz is a cybersecurity expert and entrepreneur, best known as the CEO and co-founder of Silverfort, a leading identity security company. With a background in offensive security, cryptography, and artificial intelligence, Hed brings deep expertise from both military and civilian sectors. As a product manager at Raytheon, he played a pivotal role in architecting cybersecurity programs for governments around the world.
Driven by a passion for solving complex challenges and a sharp understanding of the evolving threat landscape, Hed recognized the central role identity plays in modern cyberattacks. This insight led him to co-found Silverfort with Yaron Kassner and Matan Fatal. Together, they built a platform that stops identity-based threats without disrupting business operations.
As the threat landscape continues to evolve, Hed remains a key force shaping the future of identity security.
How Data Centric Security Reduces AI Risks in your organization – Vishal Gupta – RSAC25 #1
Gen AI is being adopted faster than company’s policy and data security can keep up, and as LLM’s become more integrated into company systems and uses leverage more AI enabled applications, they essentially become unintentional data exfiltration points. These tools do not differentiate between what data is sensitive and proprietary and what is not. This interview will examine how the rapid adoption of Gen AI is putting sensitive company data at risk, and the data security considerations and policies organizations should implement before, if, and when their employees may seek to adopt a Gen AI tools to leverage some of their undeniable workplace benefits.
Customer case studies: https://www.seclore.com/resources/customer-case-studies/
Seclore Blog: https://www.seclore.com/blog/
This segment is sponsored by Seclore. Visit https://securityweekly.com/seclorersac to learn more about them!
Vishal Gupta is an entrepreneur and business development executive with a special focus on the financial service industry. He has expertise in information rights management, information usage control, data loss prevention and enterprise software sales.
As CEO of Seclore, Vishal drives direction and stakeholder management for the company at large. He previously co-founded Herald Logic (acquired in 2007) and he regularly contributes to security industry thought leadership.
Vishal has lived and worked in Mumbai, Singapore and London, giving him critical awareness of diverse cultures, business processes and ethnic eccentricities. In addition to his interest in information security systems and processes, Vishal is an avid fan and participant of swimming and squash.
Verizon Business 2025 DBIR highlights third-party and BYOD vulnerabilities – Alex Pinto – RSAC25 #1
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings.
Segment Resources:
- https://www.verizon.com/about/news/2025-data-breach-investigations-report
- https://www.verizon.com/business/resources/reports/dbir
This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac.
Alex Pinto is one of the authors and leads the Verizon DBIR team. He joined Verizon in 2018, after it acquired his machine learning-based network detection company, Niddel. Before that, Alex was a Founder of Cipher Security, a worldwide security services provider originated in Brazil and since then acquired by Prosegur. Alex has over 20 years of experience in building security solutions, focused on the application of data science on cybersecurity. He is a frequent speaker in cybersecurity conferences, such as Black Hat and RSA Conference, and holds multiple industry certifications.
Devo & Detecteam Automate Detection Engineering for Stronger Security Posture – Jason Mical – RSAC25 #1
Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios.
Segment Resources: Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/
This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them!
Jason Mical is Devo’s Field Chief Technology Officer, providing comprehensive technical leadership across the business. With over 30 years of experience in cybersecurity, Jason collaborates closely with sales, customer success, product, marketing, and channel partners to ensure Devo meets its customers’ evolving needs.
2025: The Year of Browser Bugs – Vivek Ramachandran – RSAC25 #1
Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint.
Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security.
SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser.
Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac
Segment Resources: SquareX official website: https://sqrx.com/
SquareX YOBB page: https://sqrx.com/research
SquareX blog: https://labs.sqrx.com/
Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks
Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04
Vivek Ramachandran is a security researcher, book author, speaker-trainer, and serial entrepreneur with over two decades of experience in offensive cybersecurity. He is currently the founder of SquareX, building a browser-native security product focused on detecting, mitigating, and threat-hunting web attacks against enterprise users and consumers. Prior to that, he was the founder of Pentester Academy (acquired in 2021), which has trained thousands of customers from government agencies, Fortune 500 companies, and enterprises from over 140+ countries. Before that, Vivek’s company built an 802.11ac monitoring product sold exclusively to defense agencies.
Vivek discovered the Caffe Latte attack, broke WEP Cloaking, conceptualized enterprise Wi-Fi Backdoors, and created Chellam (Wi-Fi Firewall), WiMonitor Enterprise (802.11ac monitoring), Chigula (Wi-Fi traffic analysis via SQL), Deceptacon (IoT Honeypots), among others. He is the author of multiple five-star-rated books in offensive cybersecurity, which have sold thousands of copies worldwide and have been translated into multiple languages.
He has been a speaker/trainer at top security conferences such as Blackhat USA, Europe and Abu Dhabi, DEFCON, Nullcon, Brucon, HITB, Hacktivity, and others. Vivek’s work in cybersecurity has been covered in Forbes, TechCrunch, and other popular media outlets.
In a past life, he was one of the programmers of the 802.1x protocol and Port Security in Cisco’s 6500 Catalyst series of switches. He was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He has also published multiple research papers in the field of DDoS, ARP Spoofing Detection, and Anomaly-based Intrusion Detection Systems. In 2021, he was awarded an honorary title of Regional Director of Cybersecurity by Microsoft for a period of three years, and in 2024 he joined the BlackHat Arsenal Review Board.
Securing the Overlap: Where Endpoint Meets Cloud – Rob Allen – RSAC25 #1
There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection.
This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them!
Rob Allen is a seasoned IT professional with over two decades of experience helping businesses embrace technology while navigating its evolving challenges. His career began with a strong technical foundation—working as a system administrator, technician, and engineer—which gave him a unique understanding of both the technical and operational needs of businesses.
Rob spent his early career with an Irish-based MSP, where he served as a trusted advisor to hundreds of small and medium enterprises across diverse industries. During this time, he gained invaluable insight into the challenges faced by many businesses, particularly in the realms of security and cyber resilience.
Joining ThreatLocker in 2021 as VP of Operations for EMEA, Rob’s deep technical expertise and commitment to customer success fueled the company’s expansion across the region. Rob currently serves as ThreatLocker Chief Product Officer, driving the development and delivery of innovative security solutions, empowering businesses to safely operate in an increasingly complex threat landscape. Now a recognized expert in cyber and ransomware remediation, Rob has been on the frontlines helping organizations recover from attacks and implement proactive defenses to secure their futures.
Combatting the Access Management Crisis Starts with Simpler, Safer Solutions – Karim Toubba – RSAC25 #1
As businesses rapidly embrace SaaS and AI-powered applications at an unprecedented rate, many small-to-medium sized businesses (SMBs) struggle to keep up due to complex tech stacks and limited visibility into the skyrocketing app sprawl. These modern challenges demand a smarter, more streamlined approach to identity and access management. Learn how LastPass is reimagining access control through “Secure Access Experiences” - starting with the introduction of SaaS Monitoring capabilities designed to bring clarity to even the most chaotic environments.
Secure Access Experiences - https://www.lastpass.com/solutions/secure-access
This segment is sponsored by LastPass. Visit https://securityweekly.com/lastpassrsac to learn more about them!
Karim Toubba is the Chief Executive Officer of LastPass, having joined the company in 2022. A cybersecurity industry veteran with over 25 years of experience within the sector, Karim brings proven leadership and innovation to the security market with a focus on creating products that solve real-world challenges yet form the foundation for lasting change.
He previously served as CEO of Kenna Security, which leveraged machine learning and data science to disrupt a stagnant market and create a new category of Risk-Based Vulnerability Management (RBVM). The business was acquired by Cisco in July of 2021. He most recently served at Cisco, overseeing the Kenna Security integration along with Cisco’s EDR and XDR portfolio. Before that, he was Vice President of Products and Strategy for the Security Business Unit at Juniper Networks, a billion-dollar security business, where he oversaw product management, strategy, and technical marketing. He has held numerous executive product roles at private and public companies where he led product innovation in the areas of encryption and network analytics.
The Future of Runtime Security: Cloud Application Detection and Response (CADR) – Gal Elbaz – RSAC25 #1
Cloud Application Detection and Response (CADR) has burst onto the scene as one of the hottest categories in security, with numerous vendors touting a variety of capabilities and making promises on how bringing detection and response to the application-level will be a game changer.
In this segment, Gal Elbaz, co-founder and CTO of Oligo Security, will dive into what CADR is, who it helps, and what the future will look like for this game changing technology.
To see Oligo in action, please visit https://securityweekly.com/oligorsac
Segment Resources: https://www.oligo.security/company/whyoligo
Gal Elbaz is the co-founder and CTO at Oligo Security, bringing over a decade of expertise in vulnerability research and ethical hacking. Gal started his career as a security engineer in the IDF’s elite intelligence unit. Later on, he joined Check Point, where he was instrumental in building the research team and served as a senior security researcher. In his free time, Gal enjoys playing the guitar and participating in CTF (Capture The Flag) challenges.
No More Legacy IAM: Why Modernization and AI in Identity Security are Critical – Amit Saha – RSAC25 #1
Evolving compliance needs, overflowing tech stacks, and the ever-increasing number of types of enterprise identities — not to mention the complications resulting from business use of AI — means traditional identity platforms can't keep up with the needs of today's enterprises. Organizations need something smarter: converged, cloud-native and future-ready identity security that scales with enterprises as they grow, addressing their cybersecurity challenges today and in the future. Join us in this episode as we break down the shortcomings of legacy IAM and uncover how an intelligent, identity-centric approach sets enterprises on the path to success.
Segment Resources: Learn more about The Saviynt Identity Cloud: https://saviynt.com/products/the-identity-cloud
Identity Cloud solution brief: https://44524559.fs1.hubspotusercontent-na1.net/hubfs/44524559/Solution%20Briefs/Solution%20Guide%20%7C%20Saviynt%20Identity%20Cloud.pdf
This segment is sponsored by Saviynt! To learn more or get a free demo, please visit https://securityweekly.com/saviyntrsac
As Chief Growth Officer, Amit is focused on developing and executing on the investment and growth strategies that build and grow the company’s strategic initiatives and its core customer and partner relationships.
Amit brings over two decades of identity and cybersecurity industry expertise, where he has helped organizations address and solve some of their most critical identity, security, and compliance challenges. As a Co-Founder and the previous CEO of Saviynt, Amit was responsible for the first phase of the company’s evolution and growth, providing the strategic leadership and execution that has positioned Saviynt as a leader in the identity management market. Prior to his tenure as CEO in 2018, Amit was COO of Saviynt, where from 2014 to 2018 he led sales, business development, alliances, and go-to-market strategy. Prior to joining Saviynt, Amit held leadership positions at Infosys and HCL, including as Identity Practice Engagement Manager and Senior Architect. With his long and distinguished tenure, Amit is widely considered a leading expert in identity and access management, information security, and risk and compliance management.
Securing enterprises in the age of AI: The need for mature identity security – Lori Robinson – RSAC25 #1
While the value of identity security remains largely untapped, SailPoint’s latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities.
Segment Resources:
The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3
Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption
Learn more about SailPoint’s Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio
This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them!
Lori Robinson is Vice President of Product Management at SailPoint. Prior to rejoining SailPoint after previously serving as VP of Product and Market Strategy, she was the Vice President of Enterprise Identity Product Management at Salesforce. She also served as the Managing Vice President and Analyst at Gartner, where she covered the identity governance and administration, privileged access management, and consumer IAM markets. Lori is a recognized industry thought leader, speaker, and publisher. She is passionate about advancing opportunities for women in IT and has led various user groups, round tables, and events for women in identity.
Redefining Risk: Inside the Launch of Axonius Exposures with CISO – Lenny Zeltser – RSAC25 #1
In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company’s latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making.
Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He’ll also explore what this launch means for Axonius’ mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies.
Key Themes: The state of vulnerability and exposure management Actionability as the new frontier in cybersecurity The strategic timing of the launch with RSAC 2025 The role of unified data in accelerating risk remediation How Exposures fits into the broader Axonius vision and platform
Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo.
Lenny Zeltser is the Chief Information Security Officer at Axonius. He designs practical security solutions and shepherds them to a sustainable state. As the CISO of Axonius, he leads the security program to earn customers’ trust and fuel the company’s growth. In his prior roles, he built security products and services at companies such as NCR. Lenny helps shape cybersecurity practices by teaching at SANS Institute and sharing knowledge through writing, public speaking, and community projects. During his career, he has been hands-on in many areas of cybersecurity and IT. Now he focuses on strategy and leadership, treating security as an enabler that helps people and companies achieve their goals.
Lenny earned a B.S. in Computer Science Engineering from the University of Pennsylvania, and has an MBA from the MIT Sloan School of Management.
CyberRisk TV Live from RSAC 2025 Day 1 Daily Recap – RSAC25 #1
Doug White, host of Security Weekly News, and Jeff Man, host of Paul's Security Weekly, recap all the fun happenings during day 1 of RSAC Conference 2025!