Boston, San Francisco, New York, Seattle, San Diego, Washington D.C.
Connect
All Insights

RSAC 2025: Key Sessions You Shouldn’t Miss

Apr 28, 2025 Alecia DePew

RSAC 2025 promises a full agenda of cybersecurity experts sharing their insights on today’s most pressing industry trends, research, threats, and challenges facing the cyber community. At this year’s event, several of our Inkhouse clients will take the stage to lead insightful sessions on topics including AI, device security, cloud security, passwordless security, and even cryptography. Each offers a unique talk track, leaving attendees with a clearer understanding of the risks they’re facing. 

Attending this year’s event? Be sure to add these sessions to your calendar! 

Residential Proxies—Why Is My Cell Phone for Sale on the Dark Web?

Join Director Santiago Cortes and Lead Threat Researcher Fernando Martinez Sidera from LevelBlue as they explore recent residential proxy discoveries. Becoming a phantom threat to internet users, cybercriminals continue to leverage residential proxies, posing a substantial risk. A technical conversation, it is essential to dive deeper into how these threats are advancing.  

Santiago states that “In this session, we will cover residential proxies and how cybercriminals exploit them to mask their activities and bypass security measures. By examining the latest campaigns such as NSOCKS and ProxyNation, attendees will gain a comprehensive understanding of the sophisticated techniques used to hijack devices and expand proxy networks.”

GCP Organization Policies to Live By (And Their Implementation Pitfalls)

Led by Vectra AI’s Principal Security Researcher, Kat Traxler, this session will focus on Google Cloud Platform (GCP) Organization Policies, the guardrails attendees should implement, specific obstacles they will face, and what it means for successful adoption.

Kat explains, “Organization Policies in Google Cloud are powerful tools for enforcing security and compliance, but implementing them isn’t always straightforward. My session at RSAC aims to highlight the critical guardrails attendees should have in place, identify common pitfalls—such as hidden dependencies and unexpected friction—and provide a roadmap for successful adoption. We secure the cloud we have, not the one we want, so it’s essential to understand the real-world challenges of enforcing Org Policies. My goal is that attendees walk away with a clear understanding of how to assess risk vs. reward, set realistic KPIs, and implement policies with minimal business disruption. Whether you’re just getting started or refining your cloud strategy, this talk will give you the insights needed to navigate GCP Org Policies with confidence.”

Crypto-Agility: How It’s Both a Critical Component and a Complex Challenge 

Vice President of Software Development at Entrust, Greg Wetmore, will lead a session to discuss why crypto-agility is essential to digital security. It will help guide organizations in achieving a mature, crypto-agile security practice, addressing challenges across people, processes, and technology. 

“I’m excited to be taking part in this year’s RSAC program, where I’m examining why crypto-agility is a critical and challenging component of security for organizations,” says Greg. “Most business leaders have probably heard of ‘quantum cryptography’ or ‘the quantum era.’ However, I’m looking forward to helping leaders better understand what this means and why it’s important to start the transition to tomorrow’s post-quantum reality now, to ensure they are positioned for growth in the future.”

Using Passkeys for Authentication in High Assurance Markets: Opportunities and Challenges

During the RSAC Conference, the FIDO Alliance will host a half-day seminar dedicated to examining the latest developments in passwordless technology. As part of this seminar, OneSpan’s CTO, Ashish Jain, will lead a session addressing the advantages that passkeys offer in providing a frictionless and highly secure authentication experience. He will also consider the challenges, such as compliance with revolving regulations, interoperability with legacy systems, and industry-wide adoption barriers. Breaking down these complexities, attendees will learn how to implement passkeys in high-assurance environments effectively.  

As the RSAC agenda suggests, the cybersecurity industry is constantly evolving. Learn how Inkhouse can help support your company in today’s competitive marketplace by checking out some of our case studies

Similar Insights

inkhouse logo

blog

Inkhouse Named Agency of Record for Six Breakthrough AI Companies, Cementing Leadership in Emerging Tech Communications

Read More

blog

Inside RSAC: A Reporter’s Perspective on Covering the Industry’s Biggest Security Event

Read More

blog

Trump, Tariffs, and the Economy: How to Engage the Media in 2025

Read More
View More Insights

Subscribe to our newsletter

We share free PR, content marketing and digital media advice.

Sign Up

Chat with us.

Do you need fast help on a big announcement or want to discuss long-term communications strategy? We're here to help.

Let's Talk

Join our team.

The sign at the front desk at our headquarters reads, “Work Hard & Be Nice to People.” At Inkhouse, culture is our business model.

Apply Today