RSA - Experts & Thought Leaders

Latest RSA news & announcements

Check Point & Illumio: Zero trust security partnership

Check Point Software Technologies Ltd., a pioneer in cybersecurity solutions, and Illumio, the breach containment company, announced a strategic partnership to help organisations strengthen security and advance their Zero Trust posture. Illumio Segmentation and Insights The integration between the Check Point Infinity Platform and the Illumio Platform delivers rapid identification and mitigation of lateral movement risks across hybrid and multi-cloud environments using advanced microsegmentation enforcement. This collaboration empowers customers to combine Check Point Quantum Force Firewalls, Infinity Threat Cloud AI, and AI-Powered Security Management with Illumio Segmentation and Illumio Insights to neutralise threats by halting lateral movements and strengthening overall cybersecurity.   Zero Trust strategies "Stopping lateral movement is critical to breach prevention," says Itai Greenberg, Chief Revenue Officer at Check Point Software. "Our partnership with Illumio delivers unmatched visibility and adaptive policy enforcement, empowering organisations to contain threats fast. It also demonstrates the strength of our hybrid mesh architecture, which we envision as an open garden, and our commitment to driving Zero Trust strategies with industry pioneers." Check Point’s AI Security Management software Check Point Quantum Force firewalls serve as critical enforcement points, efficiently blocking malicious traffic Check Point Quantum Force firewalls serve as critical enforcement points, efficiently blocking malicious traffic. When threats are detected, Check Point’s AI Security Management software uses a dynamic policy layer to notify Check Point Firewalls how to block the latest threat. The integration with Illumio provides additional AI-driven insights to identify risks and attack routes, enabling quick containment. This combination stops unauthorised lateral movement, protects essential assets, and ensures consistent Zero Trust security across hybrid environments.  Key benefits of the integration  Collaborative approach to Zero Trust: Protect critical assets with effective microsegmentation across hybrid environments without deployment complexity, making Zero Trust adoption faster and simpler.  Proactive threat prevention to prevent lateral movement: Reduce breach risk and the associated costs by catching attacks earlier and preventing them from spreading laterally across networks, clouds, and resources to reach critical assets  Advanced Threat Intelligence: Utilize combined threat intelligence data from ThreatCloud AI and Illumio Insights to mitigate risk and minimise security incidents   Integration of Illumio and Check Point Illumio Segmentation contains breaches, protects critical assets, and enables instant response “This powerful collaboration between Illumio and Check Point marks a significant step forward in cybersecurity threat intelligence and breach containment," says Andrew Rubin, CEO and Founder of Illumio. "The integration of Illumio and Check Point represents a shift towards smarter, more adaptive cybersecurity by enhancing visibility, enabling real-time threat detection and response, and providing adaptive security measures that align with Zero Trust principles. Our proactive approach helps security teams connect the dots and uncover hidden threats more efficiently to avoid cyber disasters."  CDR built on an AI security graph Illumio Insights and Illumio Segmentation are integral components of the Illumio Platform, the first cybersecurity platform focused on breach containment. The world’s first CDR built on an AI security graph, Illumio Insights helps organisations quickly identify and detect threats.  Illumio Segmentation contains breaches, protects critical assets, and enables instant response. Together, these solutions help identify and mitigate risks, contain attacks, and enhance overall cyber resilience. Security and policy management Quantum product line is part of Check Point’s Infinity Platform, which is uniquely AI-powered Check Point's Quantum Force is a series of AI-powered, cloud-delivered security gateways that provide unified security and policy management across on-premises, cloud, and Firewall-as-a-Service environments, simplifying operations and enhancing security efficacy. The Quantum product line is part of Check Point’s Infinity Platform, which is uniquely AI-powered, and cloud-delivered, to protect your enterprise against cyber-attacks, from the data centre, cloud to the branch office through unified management. Integration of Check Point Quantum Force Firewall To witness the integration of Check Point Quantum Force Firewall with Illumio Insights, visit the Illumio booth in the North Hall (#5670) at the RSA Conference in San Francisco, happening from April 28 to May 1st. While at RSA, stop by the Check Point North Hall booth #6072 or attend one of the following RSAC activities. For additional details about Illumio at RSAC, explore their other sponsored activities. 

Rubrik's identity resilience secures data access

In a world of nonstop cyberattacks, Rubrik announced its newest upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data. Identity Resilience aims to protect the most common entry points for attackers – human and non-human identities (NHIs) – to help organisations maintain operations with minimal downtime.  Rubrik’s solution Rubrik’s solution is designed to secure this weak infrastructure that powers virtually Identity Resilience aims to address a blindspot in enterprise security. A critical piece of infrastructure utilised by a vast majority of organisations, identity remains a consistent target for hackers. When compromised, these identity systems grant attackers access to critical data and credentials, and their disruption can prevent cyber recovery. Rubrik’s solution is designed to secure this vulnerable authentication infrastructure that powers virtually every major enterprise. Identity risks and data security "Identity systems are not only complex and hard to manage, but they have also become the primary gateway for attackers aiming to access an organisation's valuable data," said Mike Tornincasa, Chief Business Officer at Rubrik. "Today, we signal our commitment to identity protection, to address our customers' needs by detecting threats that target identities and proactively reduce identity risks, just as we have successfully done with data security.” Why this matters: Identity is how hackers get inside Rubrik’s solution is designed to provide continuous visibility into identity changes Rubrik's identity business safeguards millions of identities globally. It’s easy to see why: A recent CISA report found that 90% of cyber attacks on critical infrastructure begin with an identity compromise, often leading to privilege escalations and lateral movement into valuable corporate data. These threats usually unfold gradually, making it essential to understand not just the “who” and “what” but also the “when” - how privilege or access patterns shift over time. By leveraging time-series data, Rubrik’s solution is designed to provide continuous visibility into identity changes, enabling earlier detection of suspicious activity. How Rubrik monitors and sustains data Similar to how Rubrik monitors and sustains data, the company’s anticipated capabilities are designed to identify, monitor, and safeguard critical, sensitive, and active identities, including non-human identities (NHIs) such as machines using service accounts and access tokens.  NHIs, which outnumber their human counterparts, are complex to manage and introduce vulnerabilities that are increasingly targeted by attackers who compromise and escalate privileges. Current identity security approaches fail to provide enterprises the capability to assess NHI risk, view data access, and track suspicious activity over time.  A holistic approach drives cyber resiliency Rubrik aims to combine these abilities to provide new abilities, and a holistic view of identity and data Too often, identity management, identity protection, and data security are siloed as different products run by different teams in an organisation. In contrast, Rubrik uniquely aims to combine these capabilities to provide new capabilities, and a holistic view of identity and data.  Identity recovery & identity resilience: Accelerating recovery Rubrik offers extensive coverage for identities across hybrid environments. New capabilities aim to empower organisations to thwart attacks earlier and restore systems more quickly to ensure cyber resilience: Hybrid Protection for Active Directory (AD) and Entra ID: With automated and orchestrated recovery workflows, organisations can restore complex hybrid identity environments - like Active Directory forests and full Entra ID tenants - faster and with greater confidence than before. Active Directory recovery can involve up to 22 manual steps. Rubrik reduces that with an easy-to-use wizard, dramatically cutting complexity and time to recovery. As a result, these capabilities are among the fastest-growing in Rubrik's history, safeguarding millions of identities and the sensitive data they access.  Comprehensive Risk Analysis for Human and Non-Human Identities: With a unified view across identity providers showing human and non-human identities who have access to sensitive data, organisations can identify dormant or orphaned accounts, detect risky privilege escalations, and expose problematic combinations of access that traditional tools often miss. Beyond visibility, organisations can track the risk associated with identities and target remediation by revoking identity access, data access, or both. This approach enforces the least privilege, shrinks their attack surface, and proactively shuts down potential identity-based threats. Complete Identity and Data Context: Instead of working with limited context from identity providers, organisations can tie identity-based information with sensitive data (e.g., healthcare, financial) context, privilege, and activity. This critical context can reduce remediation work while strengthening risk posture before a cyber attack, thereby speeding up threat hunting and remediation during and after an attack. Get a briefing on Rubrik's Identity Recovery and Identity Resilience at the 2025 RSA Conference, April 28-May 1, 2025, in San Francisco.

SIA Awards at ISC West 2025: New security solutions

ISC West 2025, organised by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. ISC West innovations and ideas “ISC West truly showcased the power of innovation, connection, and collaboration within the security industry,” said ISC Event Vice President Mary Beth Shaughnessy. “From the groundbreaking technologies on display to the meaningful discussions in our education sessions and keynotes, this year’s event underscored the remarkable progress we’re achieving together as an industry. We are incredibly proud of the innovations and ideas shared here and look forward to building on this momentum for future ISC events.” ISC West trends and challenges ISC West broke new ground with its robust and grew SIA Education@ISC program, which opened one day ISC West broke new ground with its robust and expanded SIA Education@ISC program, which opened one day earlier to give attendees even more opportunities to connect and learn. With the largest slate of sessions to date, the program featured packed rooms and sparked lively discussions led by industry experts. The sessions addressed emerging trends and challenges, offering attendees valuable knowledge to apply within their organisations. SIA Education at ISC West conference program “ISC West 2025 was a tremendous success. I heard very positive feedback from our members and have seen a lot of excitement about this show this year,” said SIA CEO Don Erickson. “The SIA Education at ISC West conference program had record-breaking attendance and featured a robust array of insightful, engaging content from our speakers and instructors. SIA saw fantastic turnout at its events and offerings during the show, and attendees benefitted from the top-quality expertise shared by our speakers, at events ranging from lively tech debates to in-depth conversations on critical infrastructure and the return on security investment." "We were also thrilled to see great presence and enthusiasm at the show from the security practitioner community. SIA is proud to be the premier sponsor of ISC West each year and looks forward to offering even more at the show in 2026.” ISC West Keynote Series Microsoft’s education lead, Kate Maxwell, closed with an inspiring session on authenticity The ISC West Keynote Series brought powerful insights to the Main Stage, starting with Rachel Wilson, director of cybersecurity at Morgan Stanley Wealth Management, who explored the shifting cyber threat landscape. Day 2 featured Will Bernhjelm, vice president of security for Mall of America, giving a behind-the-scenes look at protecting a major retail hub. Microsoft’s worldwide education lead, Kate Maxwell, closed with an inspiring session on authenticity. The Main Stage transformed into a place of celebration on Wednesday evening, where attendees and exhibitors enjoyed a performance by Gin Blossoms at the ISC West Concert. SIA New Products and Solutions Awards Another standout moment was the prestigious SIA New Products and Solutions Awards. This distinguished program highlighted the latest security advancements. Another standout moment was the prestigious SIA New Products and Solutions Awards Vaidio’s Vaidio 9.0 AI Vision Platform earned the Best New Product Award, while Robotic Assistance Devices received the Judges’ Choice Award for SARA – AI Security Agent for Autonomous Threat Detection and Response. Each innovation reflected the industry’s commitment to staying ahead of evolving threats and delivering smarter, more efficient solutions. Experts from the cyber and physical security sectors With an expanded focus on cybersecurity and enhanced educational opportunities, ISC West 2025 introduced a new RSA @ISC: IT for Security Professionals track, in partnership with RSA, alongside its core education tracks. Among the many insightful sessions was “Two Worlds Colliding: How to Prevent Cyber-Physical Attacks,” held at The Bridge. This thought-provoking panel brought together experts from the cyber and physical security sectors to examine the power of collaboration in countering modern threats. Following the discussion, attendees had the opportunity to meet Deb Radcliff, cybercrime journalist and author, and receive signed copies of her thrilling novel, “Breaking Backbones: Information Is Power.” Later this year, ISC East 2025, the pioneering security event in the Northeast, will be held Nov. 18-20 at the Javits Centre in New York City.

Insights & Opinions from thought leaders at RSA

Looking ahead to ISC West 2025: Q&A with Mary Beth Shaughnessy

As the pioneering security event in the United States, ISC West is truly the global focal point for bringing together professionals across the physical and cybersecurity landscape. The event seeks to showcase innovation in security technology, nurture professional development, and explore the security implications of today’s connected world. Future of security  With the growth of cybersecurity programming and the established Cybersecurity & Connected Internet of Things (IoT) pavilion, ISC West is addressing the future of security head-on. “As the lines between the digital and physical worlds blur, collaboration and shared learning among defenders have never been more critical,” says Mary Beth Shaughnessy, Event Vice President at RX USA, who oversees all aspects of the ISC brand. Shaughnessy previews what’s new at ISC West 2025 and shares other insights in our interview. Q: For long-time attendees at ISC West, what will be the biggest surprise at the 2025 show? Shaughnessy: Long-time attendees know to expect top-tier educational content through the SIA Education@ISC West program (produced by the Security Industry Association (SIA)) in addition to cutting-edge security innovations showcased by 700+ exhibitors. New this year is our focus on technology, training, and education around cyber-physical threats. In today’s connected world, physical and cybersecurity defenders must take a unified, holistic approach to protecting their people, assets, and data. ISC West serves as a bridge between those two worlds, helping organisations tackle the complex security landscape. Q: Presenting a high-profile music concert as part of ISC West is a fun value-add for attendees. Describe how this feature has been embraced by longtime attendees, and the plans for 2025. Shaughnessy: We’re thrilled to announce that the legendary Gin Blossoms will headline the ISC West Concert, sponsored by Wavelynx. This tradition began last year and became a celebrated highlight, offering professionals a chance to unwind and connect with colleagues and peers after a productive day on the show floor. When choosing a performer, we focus on acts that resonate across generations, making the experience both entertaining and memorable for our diverse audience. We are excited to continue this fun and exciting event and networking opportunity. Q: In the past, the education program at ISC West has been seen as secondary to the Expo event. How have you sought to increase the profile of the education program, and what new features will attract more attendees in 2025?   Shaughnessy: We’ve expanded the SIA Education@ISC programming from three to four days, now beginning two days before the expo hall opens. These dedicated education days ensure professionals can engage in thoughtful discussions and gain actionable insights without overlapping with the Expo. This year, we’re proud to partner with RSA to introduce a new “IT for Security Professionals” track while also offering our core tracks, including AI & Digital Transformation, Critical Infrastructure & Data Protection, Cybersecurity & IT, InfraGard National Members Alliance @ ISC, and Video Surveillance. We will also be welcoming powerful keynote speakers — Rachel Wilson, Director of Cybersecurity, Morgan Stanley Wealth Management; Will Bernhjelm, Vice President of Security, Mall of America; and Kate Maxwell, Chief Technology Officer, Worldwide Defense & Intelligence, Microsoft. Q: What else is “new” at ISC West in 2025? Shaughnessy: Our educational programming has grown significantly — this year’s SIA Education@ISC program is our most extensive yet, offering more than 115 sessions led by over 200 distinguished experts. With broader and deeper topics, the program emphasises the critical convergence of cyber and physical security, providing unparalleled insights for today’s security professionals. We are also significantly ramping up our cybersecurity offerings and expect to have more than 50 exhibitors in our Cybersecurity & Connected IoT pavilion with names such as Entrust and Ontic. Q: Networking is a critical aspect of ISC West. How are show organisers working to increase networking opportunities? Shaughnessy: Networking remains a top priority at ISC West, with countless opportunities to build valuable connections. Professionals can join peers at popular spots like The Bridge, The Cyber Hub, and the Career Zone (sponsored by: TEECOM). These spaces offer the chance to learn from industry experts, explore the challenges and innovations shaping the security workforce, and engage in dynamic discussions with peers. Also, returning by popular demand, the ISC West Concert, proudly sponsored by Wavelynx, delivers a vibrant evening of music and networking in a relaxed atmosphere. Together, these experiences ensure networking at ISC West is both impactful and memorable. Q: What is the biggest challenge for organisers of ISC West (and related events), and how are the organisers seeking to address the challenges? Shaughnessy: As with most events, there is a lot of pressure on organisers to ensure there’s “something for everyone,” add meaningful value, and introduce fresh, exciting features. At ISC West, we work to raise the bar each year by expanding our content with more thought pioneers, showcasing a broader range of innovative technologies, and fostering additional networking opportunities. Achieving top-quality results is no small task — it demands careful planning, collaboration, and a dedication to continuous improvement. This means actively listening to the needs of our attendees and exhibitors, staying ahead of industry trends, and ensuring we provide an experience that informs, inspires, and connects the security community.

Quick poll
How likely is it that companies will invest in cloud-based physical security solutions in the next 5 years?