Data Security Posture Management
Cybersecurity Meetup
44 Stories to Extend Your RSA Experience
  • Vendor interviews & updates from RSA
  • LIVE Discussions (1 pm EDT, May 10th & 11th) with industry leaders on Key Takeaways from RSA 2023 (May 10th & 11th @ 1-2pm EDT)
Demo Rooms
Click on a Vendor Logo to Learn More

Aqua: We Stop Cloud Native Attacks

Aqua’s Cloud Native Security Platform is the leading platform for securing the entire cloud application lifecycle, reducing risk, saving time, and protecting your business in real time from dev to cloud and back.

Axis Security: Elevate Your Access Security with SSE

Axis Security is accelerating work-from-anywhere, partner collaboration, and digital transformations with a simple managed cloud solution for access, security, and control.
Barracuda Networks at RSA 2023

More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application and cloud security, network security and data protection.
API Security Redefined: Unified API Protection

Cequence Unified API Protection unifies API discovery, inventory, compliance, dynamic testing with real-time detection and native prevention to defend against fraud, business logic attacks, exploits and unintended data leakage. Learn more at
Karthik Concentric Interview

Karthik Krishnan, CEO of Concentric AI, discusses how the Concentric DSPM platform uses large language models to autonomously discover, classify, monitor and remediate risk in structured and unstructured data without rules or regex. The solution deploys in minutes, delivers value in days to prevent data loss.
Cyrus Concentric Interview

VP of Marketing at Concentric AI, discusses how their platform can autonomously discover sensitive data and identify data at-risk no matter it lives – in the cloud, on-premises or in SaaS applications.
Cyberint: Threat Intelligence & Digital Risk Protection

Powered by a unique combination of a SaaS platform and a world-class expert team, Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.
Cyera: Know your data. Keep it secure.

Cyera, the Data Security Platform that puts data first, automatically classifying and developing deep context on all your data - structured and unstructured, IaaS, DBaaS, and SaaS - to remediate security, privacy and regulatory exposures, fast
Cymulate: Security Posture Management Platform

Cymulate CMO Carolyn Crandall is interviewed at RSA 2023. Cymulate enables remote working by ensuring that VPN connections are secure and people continue to be productive with least privilege access.
Dig Security: RSA 2023 Roundup

The CEO of Dig Security has joined us at RSA 2023, sharing his vision for DSPM and Dig's category leading approach combining DSPM and real-time threat protection (DDR).
The DoControl SaaS Security Platform

DoControl provides a unified, automated and risk-aware SaaS Security Platform that secures business critical data, drives operational efficiencies, and enables business productivity
Ermetic's Cloud Infrastructure Entitlement Management (CIEM)

Learn how Ermetic’s identity-first CIEM, part of our award-winning, comprehensive cloud native application protection platform (CNAPP), can bring you industry-leading cloud identities and entitlements security.
How Boise State University is Bringing Cybersecurity to Rural Idaho, and Beyond

Edward Vasko from Bosie State University talks about keeping rural Idaho secure from cyberattacks and how partnering with Stellar Cyber helps him train tomorrow's cybersecurity professionals. For more information, visit
GhangorCloud: The 4 th Generation Cybersecurity Platform for Data Leak & Exfiltration Prevention (DLEP)

GhangorCloud’s Information Security Enforcer Platform, provides most credible protection against the most sophisticated Cyberattacks against Data. Utilizing breakthrough “Deep AI” based Automation of Data-Classification, Policy-Synthesis and Access-Control, it’s the Gold Standard in Cybersecurity.
Halcyon Anti Ransomware and Cyber Resilience Platform

The industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks. The Halcyon platform is a lightweight agent that combines multiple proprietary advanced prevention engines along with AI models trained solely on ransomware.
Indicio: Protecting Your Data in a Post-perimeter World

Learn how you can eliminate direct integrations between organizations by using a verifiable credential and decentralized ledger to securely store, exchange, and share verified, authoritative data.
Invicti: AppSec With Zero Noise

Invicti delivers the most accurate and efficient DAST solution for DevOps/DevSecOps teams to discover and secure all the applications that run their organizations.
Laminar: Agile Data Security Platform for the Cloud

Laminar’s agile data security platform is cloud-native and 100% autonomous. Covering data inventory, Data Security Posture Management (DSPM), Data Access Governance (DAG), Data Detection and Response (DDR) as well as privacy and compliance.
Morphisec: Prevention-First Endpoint Security

Morphisec prevents the most damaging, undetectable attacks others don’t by securing runtime memory and providing real-time risk visibility. Our Automated Moving Target Defense technology stops threats that evade NGAV and EDR/XDR, with no performance impact or additional staff.
Nucleus Security: Unified Vulnerability Management

Nucleus is a Risk Based Vulnerability Management (RBVM) solution that automates vulnerability management processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the resources that it takes to perform these tasks today.
Open Raven Interview

Open Raven CEO Dave Cole discusses the transformation changes driving the need for greater cloud data security, the benefits of the Open Raven Data Security Platform, and the multi-cloud capabilities announced prior to RSA Conference 2023.
Ordr Asset Inventory and Security

Ordr makes it easy to secure every asset, from traditional IT to IoT, IoMT and OT. Ordr discovers every asset, identifies the attack surface they create, and protects them with automated policies.
ReversingLabs: Securing the Software Supply Chain

ReversingLabs Software Supply Chain Security (SSCS) Platform analyzes complex software packages composed of open-source and commercial third-party components for malware, secrets and tampering when others only look for vulnerabilities.
SafeBreach: Leverage the Attack to Improve Your Defenses

The SafeBreach platform works seamlessly with your security controls and business systems, including SIEM, SOAR, workflow management, and vulnerability management tools.
Salt: API Security

Salt created the API security market and delivers the adaptive intelligence needed for robust API discovery and threat protection in runtime. These core API security capabilities provide the greatest risk reduction in the shortest time.
Smallstep: Zero Trust means "Zero gaps"

Adopt true Zero Trust at scale by enabling your teams to observe and automate end-to-end encryption for software, hardware, and people, using Smallstep's certificate-based encryption solution, effectively leaving no gap between what must be secured and what secures it.
Spirion Sensitive Data Discovery

Spirion is Step One for Privacy-Grade™ discovery, classification, protection, and overall governance of your unstructured and structure sensitive data footprint with a 98.5% accuracy rating at finding data at rest.
Stacklet: Cloud Governance as Code Platform

Stacklet allows you to codify, visualize, and automate all aspects of governance. With Stacklet, you can provide proactive guardrails to your development team to innovate in the cloud with unrivaled security and efficiency.
Tenable One: The Exposure Management Platform

Tenable One is an exposure management platform that combines risk-based vulnerability management, web application security, cloud security and identity security. Anticipate likely attacks. Proactively reduce your cyber risk.
XM Cyber Continuous Exposure Management Platform

XM Cyber identifies how attackers combine exposures like misconfigurations, credentials, vulnerabilities, and more, to compromise hybrid networks and help teams remediate issues at a fraction of the effort to effectively improve security posture.
Yubico: Moving Away from Legacy MFA to Phishing-Resistant MFA with the YubiKey

Yubico, the leading provider of hardware authentication security keys, makes secure login easy and available for everyone. Learn why now is the time to move from legacy authentication to modern, phishing-resistant MFA.
Cybersecurity Replay! Agenda
---------------------- NEW CONTENT AVAILABLE TODAY ----------------------